Op maandag, juni- 10, 2019, een van 's werelds grootste ATM fabrikant Diebold Nixdorf begon aan haar klanten te waarschuwen voor kwetsbaarheden in Opteva geldautomaten. De fout maakt op afstand een willekeurige code.NightSt0rm, een groep van Vietnamese experts, gepubliceerde informatie over dit beveiligingslek vorige week. Volgens de onderzoekers, they were able to find an external OS service in old Opteva ATMs, which can be used to place a reverse shell on vulnerable machines and then intercept control over them.
“The potential problem is with the Agilis XFS service using .NET Remoting via the“ outward-looking ”HTTP channel”, – explained Diebold Nixdorf in an official statement. The company reports that the problem affects only Opteva 4.x and does not apply to newer versions.
The developer released a fixed Agilis XFS variation for Opteva – BulkCashRec (BCRM) Versie 4.1.22, which closes “looking out” HTTP hole. In aanvulling op, it is reported that from a potential attack, you can protect yourself by using a simple firewall setting, which even old Opteva ATMs are equipped with.
The company explains that the NightSt0rm researchers deliberately turned off the firewall during their tests, and without this the attack on the vulnerability will not succeed. Bovendien, according to Diebold Nixdorf, attackers never tried to exploit the vulnerability.
Inconsistency in question of disclosure data on hugs, Blijkbaar, was due to usual error. Zo, NightSt0rm experts assured that they were unable to contact representatives of Diebold Nixdorf and therefore disclosed information about the problem publicly.
"Helaas, they initially contacted us through the“ Contact us ”form on our website. Through it, hundreds of applications are sent to us every month with very common statements about vulnerabilities in one of our ATMs”, – explains Diebold Nixdorf.
The company assured that they did ignore the researchers, and now the connection with the NightSt0rm team has already been established.