RunOut™ - A New Vulnerability Threatens Tens of Thousands of Gas Stations
A newly discovered ‘Zero-Day’ vulnerability, named RunOut™, affects Gas Station Automatic Tank Gauges (ATGs). This poses a significant threat to the US Critical Energy Infrastructure.
What is RunOut™ ?
RunOut™ is a vulnerability that can be easily exploited to block remote access to the Automatic Tank Gauges (ATGs) in gas stations. An attack exploiting this vulnerability will cause widespread disruption of fuel deliveries, causing a domino effect of runouts, fuel shortages, high prices and serious economic damage.
Who will attack and why?
FBI Director Christopher Wray warns that state sponsored and other hacking groups linked to China, Russia, Iran and North Korea already threaten the US Critical Infrastructure. As RunOut™ is impossible to mitigate, the threat will be long lasting. In addition RunOut™ can also be used in Ransomware attacks.
Why isn’t the threat of retaliation a deterrent against RunOut™ attacks?
There are two reasons why the threat of retaliation might not be effective:
Is there a solution to the RunOut™ vulnerability?
A RunOut™ attack would disrupt a significant portion of gas stations in the United States, of which 100,000 are remotely accessed, according to claims by the companies who rely on remote communication with these ATGs. Most of these companies utilize TCP/IP polling over the Internet making these locations susceptible to RunOut™ attacks.
How widespread could a RunOut™ attack be?
No, unlike vulnerabilities in software and hardware, the RunOut™ vulnerability cannot be mitigated by updates and patches. It is baked-in into the TCP/IP polling method of remote communication with ATGs.
The recommended way to avoid an attack that exploits RunOut™ and other ATG vulnerabilities is to avoid TCP/IP polling, especially over the Internet.
Who would the attack impact?
A RunOut™ attack would have a ripple effect impacting several groups:
When would the impact of an attack be felt and how long
would it take to recover?
The current fuel supply chain operates on a "just-in-time" model, meaning deliveries are made based on real-time needs. A RunOut™ attack disrupts this delicate balance, leading to widespread shortages:
What are the solutions to mitigate RunOut™ Attacks?
Are services that poll using TCP/IP and use firewalls or VPNs
vulnerable to RunOut™?
firewalls or VPNs do protect against RunOut™, compromised systems can be exploited. According to a warning by FBI Director Christopher Wray, the systems that control the Critical Infrastructure, which include TCP/IP polling servers, have already been compromised by Volt Typhoon and other hacking groups.
Compromised servers employing TCP/IP polling could be leveraged by attackers to bypass all ATG protection measures and launch widespread attacks on a large scale, such as targeting tens of thousands of gas stations. RunOut™ now allows attackers to use these compromised servers for attacks without fear of retaliation.
Why hasn't ARUME publicly disclosed technical details on RunOut™?
The RunOut™ vulnerability is baked-in to the TCP/IP polling design. Sharing technical details wouldn't lead to viable solutions from vendors.
Public disclosure could mirror the situation after January 2015, when exposed ATG vulnerabilities were exploited. ARUME fears similar misuse of RunOut™.
Instead ARUME has developed free, safe, non-intrusive tools to check sites for ATG vulnerabilities including RunOut™.
Similar to CISA's malware analysis tool for malware analysis, ARUME takes a proactive approach that helps organizations assess their risk without publicly exposing the vulnerability details.
Two videos which provide proof of concept for RunOut™ are:
Blocking a site and Detecting password protection.
ARUME understands the importance of security research. Bona fide researchers can contact ARUME for information on how to investigate ATG vulnerabilities responsibly.