Home » News » In Diebold Nixdorf ATMs detected RCE-vulnerability

In Diebold Nixdorf ATMs detected RCE-vulnerability

On Monday, June 10, 2019, one of the world’s largest ATM manufacturers Diebold Nixdorf began to warn its customers about vulnerabilities in Opteva ATMs. The bug allows remotely execute an arbitrary code.

NightSt0rm, a group of Vietnamese experts, published information about this vulnerability last week. According to the researchers, they were able to find an external OS service in old Opteva ATMs, which can be used to place a reverse shell on vulnerable machines and then intercept control over them.

“The potential problem is with the Agilis XFS service using .NET Remoting via the“ outward-looking ”HTTP channel”, – explained Diebold Nixdorf in an official statement. The company reports that the problem affects only Opteva 4.x and does not apply to newer versions.

The developer released a fixed Agilis XFS variation for OptevaBulkCashRec (BCRM) version 4.1.22, which closes “looking out” HTTP hole. In addition, it is reported that from a potential attack, you can protect yourself by using a simple firewall setting, which even old Opteva ATMs are equipped with.

The company explains that the NightSt0rm researchers deliberately turned off the firewall during their tests, and without this the attack on the vulnerability will not succeed. Moreover, according to Diebold Nixdorf, attackers never tried to exploit the vulnerability.

Read also: 57% of mail-servers have critical vulnerability

Inconsistency in question of disclosure data on hugs, apparently, was due to usual error. So, NightSt0rm experts assured that they were unable to contact representatives of Diebold Nixdorf and therefore disclosed information about the problem publicly.

“Unfortunately, they initially contacted us through the“ Contact us ”form on our website. Through it, hundreds of applications are sent to us every month with very common statements about vulnerabilities in one of our ATMs”, – explains Diebold Nixdorf.

The company assured that they did ignore the researchers, and now the connection with the NightSt0rm team has already been established.

READ  Vulnerabilities in MMC allow taking control over the system

Source: https://scribd.com

[Total: 0    Average: 0/5]

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

Adwind attacks energy sector

RAT Trojan Adwind attacks US energy sector

Unknown attackers targeted infrastructure of the US electricity industry. With the help of malicious emails, …

Trojan Bolik masks under NordVPN

Bank Bolik Trojan masks itself under NordVPN

Doctor Web experts warned that attackers use copies of popular services sites to distribute Bolik …

Leave a Reply