Home » News » In Diebold Nixdorf ATMs detected RCE-vulnerability

In Diebold Nixdorf ATMs detected RCE-vulnerability

On Monday, June 10, 2019, one of the world’s largest ATM manufacturers Diebold Nixdorf began to warn its customers about vulnerabilities in Opteva ATMs. The bug allows remotely execute an arbitrary code.

NightSt0rm, a group of Vietnamese experts, published information about this vulnerability last week. According to the researchers, they were able to find an external OS service in old Opteva ATMs, which can be used to place a reverse shell on vulnerable machines and then intercept control over them.

“The potential problem is with the Agilis XFS service using .NET Remoting via the“ outward-looking ”HTTP channel”, – explained Diebold Nixdorf in an official statement. The company reports that the problem affects only Opteva 4.x and does not apply to newer versions.

The developer released a fixed Agilis XFS variation for OptevaBulkCashRec (BCRM) version 4.1.22, which closes “looking out” HTTP hole. In addition, it is reported that from a potential attack, you can protect yourself by using a simple firewall setting, which even old Opteva ATMs are equipped with.

The company explains that the NightSt0rm researchers deliberately turned off the firewall during their tests, and without this the attack on the vulnerability will not succeed. Moreover, according to Diebold Nixdorf, attackers never tried to exploit the vulnerability.

Read also: 57% of mail-servers have critical vulnerability

Inconsistency in question of disclosure data on hugs, apparently, was due to usual error. So, NightSt0rm experts assured that they were unable to contact representatives of Diebold Nixdorf and therefore disclosed information about the problem publicly.

“Unfortunately, they initially contacted us through the“ Contact us ”form on our website. Through it, hundreds of applications are sent to us every month with very common statements about vulnerabilities in one of our ATMs”, – explains Diebold Nixdorf.

The company assured that they did ignore the researchers, and now the connection with the NightSt0rm team has already been established.

READ  Thrangrycat vulnerability can be used for malware invasion in Cisco equipment

Source: https://scribd.com

[Total: 0    Average: 0/5]

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

Exim server under attack

Millions of unpatched Exim mail servers are now under active attack

Cybercriminals are now actively attacking mail servers that use Exim for their work to exploit …

Researchers taught Rowhammer to steal data

A team of researchers from the United States, Australia and Austria developed a new version …

Leave a Reply