ID

VAR-202008-0007


CVE

CVE-2020-10125


TITLE

NCR SelfServ ATM BNA contains multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#815655

DESCRIPTION

NCR SelfServ ATMs running APTRA XFS 04.02.01 and 05.01.00 implement 512-bit RSA certificates to validate bunch note acceptor (BNA) software updates, which can be broken by an attacker with physical access in a sufficiently short period of time, thereby enabling the attacker to sign arbitrary files and CAB archives used to update BNA software, as well as bypass application whitelisting, resulting in the ability to execute arbitrary code. NCR SelfServ automated teller machines (ATMs) running APTRA XFS 04.02.01 and 05.01.00 are vulnerable to physical attacks on the communications bus between the host computer and the bunch note accepter (BNA). NCR ATM SelfServ devices running APTRA XFS 04.02.01 and 05.01.00 contain vulnerabilities that can be exploited by an attacker with physical access to the internal components of the ATM, specifically the BNA and the host computer. CVE-2020-10124 NCR SelfServ ATMs running APTRA XFS 05.01.00 do not encrypt, authenticate, or verify the integrity of messages between the BNA and the host computer. A similar vulnerability is identified as CVE-2020-9062 in VU#221785. CVE-2020-9062 involves the cash and check deposit module (CCDM) in ATMs from a different vendor. The CCDM is functionally similar to the BNA. (CWE-326) CVE-2020-10126 NCR SelfServ ATMs running APTRA XFS 05.01.00 do not properly validate software updates for the BNA. An attacker with physical access to internal ATM components can restart the host computer. During boot, the update process looks for CAB archives on removable media and executes a specific file without first validating the signature of the CAB archive. This allows an attacker to execute arbitrary code with SYSTEM privileges. (CWE-305) An attacker with physical access to the internal components of the ATM, including the BNA, can execute arbitrary code. An attacker may also be able to commit deposit forgery, with or without also executing arbitrary code. A deposit forgery attack requires two separate transactions. The attacker must first deposit actual currency and manipulate the message from the BNA to the host computer to indicate a greater amount or value than was actually deposited. Then the attacker must make a withdrawal for an artificially increased amount or value of currency. This second transaction may need to occur at an ATM operated by a different financial institution (i.e., a not-on-us or OFF-US transaction). NCR SelfServ ATMs is a self-service ATM machine equipment

Trust: 2.16

sources: NVD: CVE-2020-10125 // CERT/CC: VU#815655 // CNVD: CNVD-2020-48986

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-48986

AFFECTED PRODUCTS

vendor:ncrmodel:aptra xfsscope:eqversion:05.01.00

Trust: 1.0

vendor:ncrmodel:aptra xfsscope:eqversion:04.02.01

Trust: 1.0

vendor:ncrmodel:selfserv atmsscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-48986 // NVD: CVE-2020-10125

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-10125
value: HIGH

Trust: 1.0

CNVD: CNVD-2020-48986
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202008-1020
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-10125
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2020-48986
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-10125
baseSeverity: HIGH
baseScore: 7.6
vectorString: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 6.0
version: 3.1

Trust: 1.0

sources: CNVD: CNVD-2020-48986 // CNNVD: CNNVD-202008-1020 // NVD: CVE-2020-10125

PROBLEMTYPE DATA

problemtype:CWE-326

Trust: 1.8

problemtype:CWE-305

Trust: 0.8

sources: CERT/CC: VU#815655 // NVD: CVE-2020-10125

TYPE

encryption problem

Trust: 0.6

sources: CNNVD: CNNVD-202008-1020

PATCH

title:Patch for NCR SelfServ ATMs APTRA XFS Encryption Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/232060

Trust: 0.6

title:NCR SelfServ ATMs Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=126803

Trust: 0.6

sources: CNVD: CNVD-2020-48986 // CNNVD: CNNVD-202008-1020

EXTERNAL IDS

db:CERT/CCid:VU#815655

Trust: 3.0

db:NVDid:CVE-2020-10125

Trust: 2.2

db:CNVDid:CNVD-2020-48986

Trust: 0.6

db:CNNVDid:CNNVD-202008-1020

Trust: 0.6

sources: CERT/CC: VU#815655 // CNVD: CNVD-2020-48986 // CNNVD: CNNVD-202008-1020 // NVD: CVE-2020-10125

REFERENCES

url:https://www.ncr.com/content/dam/ncrcom/content-type/documents/ncr_security_alert-2018-13_aptra_xfs_

Trust: 2.4

url:https://kb.cert.org/vuls/id/815655

Trust: 1.6

url:https://www.kb.cert.org/vuls/id/815655

Trust: 1.2

url:v5.pdf

Trust: 0.8

url:https://home.treasury.gov/news/press-releases/sm0410

Trust: 0.8

url:https://www.treasury.gov/resource-center/sanctions/ofac-enforcement/pages/20180611.aspx

Trust: 0.8

url:https://www.treasury.gov/resource-center/sanctions/programs/documents/cyber_eo.pdf

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-10125

Trust: 0.6

sources: CERT/CC: VU#815655 // CNVD: CNVD-2020-48986 // CNNVD: CNNVD-202008-1020 // NVD: CVE-2020-10125

CREDITS

These vulnerabilities were researched and reported by Roman Bazhin and Dmitry Turchenkov. At the time of the initial report, Roman Bazhin and Dmitry Turchenkov were associated with Embedi. Coordinating with Embedi was supported by U.S. Department of the Treasury, Office of Foreign Assets Control (OFAC) License No. CYBER2-2019-359003-1, Cyber-Related Sanctions Regulations License issued April 2, 2019 to Licensees: CERT Coordination Center at Carnegie Mellon’s Software Engineering Institute (CERT), U.S. Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA), the National Cybersecurity and Communications Integration Center. This document was written by Eric Hatleback and Laurie Tyzenhaus.

Trust: 0.8

sources: CERT/CC: VU#815655

SOURCES

db:CERT/CCid:VU#815655
db:CNVDid:CNVD-2020-48986
db:CNNVDid:CNNVD-202008-1020
db:NVDid:CVE-2020-10125

LAST UPDATE DATE

2024-11-23T22:11:25.618000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#815655date:2020-08-21T00:00:00
db:CNVDid:CNVD-2020-48986date:2020-08-28T00:00:00
db:CNNVDid:CNNVD-202008-1020date:2021-01-05T00:00:00
db:NVDid:CVE-2020-10125date:2024-11-21T04:54:52.277

SOURCES RELEASE DATE

db:CERT/CCid:VU#815655date:2020-08-20T00:00:00
db:CNVDid:CNVD-2020-48986date:2020-08-28T00:00:00
db:CNNVDid:CNNVD-202008-1020date:2020-08-20T00:00:00
db:NVDid:CVE-2020-10125date:2020-08-21T21:15:11.497