"Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking"

Synack Red Team Members discovered several vulnerabilities in the ScrutisWeb ATM fleet monitoring software made by French company Iagona that could be exploited to remotely hack ATMs.  The vendor patched the vulnerabilities in July 2023 with the release of ScrutisWeb version 2.1.38.  ScrutisWeb allows organizations to monitor banking or retail ATM fleets from a web browser, enabling them to quickly respond to problems.  The solution can be used to monitor hardware, reboot or shut down a terminal, send and receive files, and modify data remotely.  It’s worth noting that ATM fleets can include check deposit machines and payment terminals in a restaurant chain.  The four types of vulnerabilities found by the researchers include CVE-2023-33871, CVE-2023-38257, CVE-2023-35763, and CVE-2023-35189.  The flaws include path traversal, authorization bypass, hardcoded cryptographic key, and arbitrary file upload issues that can be exploited by remote, unauthenticated attackers.  The researchers noted that threat actors could exploit the flaws to obtain data from the server (configurations, logs, and databases), execute arbitrary commands, obtain encrypted administrator passwords, and decrypt them using a hardcoded key.  The researchers said an attacker can leverage the flaws to log into the ScrutisWeb management console as an admin and monitor the activities of connected ATMs, enable management mode on the devices, upload files, and reboot or power them off.  Hackers could also exploit the remote command execution vulnerability to hide their tracks by deleting relevant files.  The researchers noted that additional exploitation from this foothold in the client’s infrastructure could occur, making this an internet-facing pivot point for a malicious actor.
 

SecurityWeek reports: "Iagona ScrutisWeb Vulnerabilities Could Expose ATMs to Remote Hacking"

Submitted by Anonymous on