In Diebold Nixdorf ATMs detected RCE-vulnerability

On Monday, June 10, 2019, one of the world’s largest ATM manufacturers Diebold Nixdorf began to warn its customers about vulnerabilities in Opteva ATMs. The bug allows remotely execute an arbitrary code.

NightSt0rm, a group of Vietnamese experts, published information about this vulnerability last week. According to the researchers, they were able to find an external OS service in old Opteva ATMs, which can be used to place a reverse shell on vulnerable machines and then intercept control over them.

“The potential problem is with the Agilis XFS service using .NET Remoting via the“ outward-looking ”HTTP channel”, – explained Diebold Nixdorf in an official statement. The company reports that the problem affects only Opteva 4.x and does not apply to newer versions.

The developer released a fixed Agilis XFS variation for OptevaBulkCashRec (BCRM) version 4.1.22, which closes “looking out” HTTP hole. In addition, it is reported that from a potential attack, you can protect yourself by using a simple firewall setting, which even old Opteva ATMs are equipped with.

The company explains that the NightSt0rm researchers deliberately turned off the firewall during their tests, and without this the attack on the vulnerability will not succeed. Moreover, according to Diebold Nixdorf, attackers never tried to exploit the vulnerability.

Read also: 57% of mail-servers have critical vulnerability

Inconsistency in question of disclosure data on hugs, apparently, was due to usual error. So, NightSt0rm experts assured that they were unable to contact representatives of Diebold Nixdorf and therefore disclosed information about the problem publicly.

“Unfortunately, they initially contacted us through the“ Contact us ”form on our website. Through it, hundreds of applications are sent to us every month with very common statements about vulnerabilities in one of our ATMs”, – explains Diebold Nixdorf.

The company assured that they did ignore the researchers, and now the connection with the NightSt0rm team has already been established.


About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

MageCart on the Heroku Cloud Platform

Researchers Found Several MageCart Web Skimmers On Heroku Cloud Platform

Researchers at Malwarebytes reported about finding several MageCart web skimmers on the Heroku cloud platform …

Android Spyware CallerSpy

CallerSpy spyware masks as an Android chat application

Trend Micro experts discovered the malware CallerSpy, which masks as an Android chat application and, …

Leave a Reply