på mandag, juni 10, 2019, one of the world’s largest ATM manufacturers Diebold Nixdorf began to warn its customers about vulnerabilities in Opteva ATMs. The bug allows remotely execute an arbitrary code.NightSt0rm, a group of Vietnamese experts, published information about this vulnerability last week. Ifølge forskerne, they were able to find an external OS service in old Opteva ATMs, which can be used to place a reverse shell on vulnerable machines and then intercept control over them.
“The potential problem is with the Agilis XFS service using .NET Remoting via the“ outward-looking ”HTTP channel”, – explained Diebold Nixdorf in an official statement. The company reports that the problem affects only Opteva 4.x and does not apply to newer versions.
The developer released a fixed Agilis XFS variation for Opteva – BulkCashRec (BCRM) Versjon 4.1.22, which closes “looking out” HTTP hole. I tillegg, it is reported that from a potential attack, you can protect yourself by using a simple firewall setting, which even old Opteva ATMs are equipped with.
The company explains that the NightSt0rm researchers deliberately turned off the firewall during their tests, and without this the attack on the vulnerability will not succeed. Dess, according to Diebold Nixdorf, attackers never tried to exploit the vulnerability.
Inconsistency in question of disclosure data on hugs, Tilsynelatende, was due to usual error. Så, NightSt0rm experts assured that they were unable to contact representatives of Diebold Nixdorf and therefore disclosed information about the problem publicly.
"Dessverre, they initially contacted us through the“ Contact us ”form on our website. Through it, hundreds of applications are sent to us every month with very common statements about vulnerabilities in one of our ATMs”, – explains Diebold Nixdorf.
The company assured that they did ignore the researchers, and now the connection with the NightSt0rm team has already been established.