CVE-2023-28725
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary Java code on General Bytes Crypto Application Server by uploading malicious applications to a specific directory. It affects General Bytes BATM devices running CAS versions before the fix, enabling complete system compromise. Attackers exploited this in March 2023 to steal over $1.6 million from cryptocurrency ATMs.
💻 Affected Systems
- General Bytes Crypto Application Server (CAS)
- General Bytes BATM devices
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover, theft of all cryptocurrency funds, installation of persistent backdoors, and lateral movement to other systems.
Likely Case
Theft of cryptocurrency funds, installation of malware for future attacks, and disruption of ATM operations.
If Mitigated
Limited impact with proper network segmentation and access controls, potentially only service disruption.
🎯 Exploit Status
Actively exploited in the wild as confirmed by vendor and news reports; involves simple file upload to specific directory.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 20221118.48 and 20230120.44
Vendor Advisory: https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023
Restart Required: Yes
Instructions:
1. Download the patched version from General Bytes. 2. Stop the CAS service. 3. Install the update. 4. Restart the service. 5. Verify the version is updated.
🔧 Temporary Workarounds
Restrict access to deployment directory
linuxBlock unauthorized access to the /batm/app/admin/standalone/deployments directory using firewall rules or access controls.
# Example: iptables rule to block external access to port/directory
iptables -A INPUT -p tcp --dport [CAS_PORT] -j DROP
Disable unnecessary services
linuxDisable or restrict the CAS deployment service if not essential for operations.
systemctl stop [CAS_SERVICE_NAME]
systemctl disable [CAS_SERVICE_NAME]
🧯 If You Can't Patch
- Isolate affected systems from the internet and internal networks using firewall rules.
- Implement strict access controls and monitoring for the /batm/app/admin/standalone/deployments directory.
🔍 How to Verify
Check if Vulnerable:
Check CAS version; if earlier than 20221118.48 or 20230120.44, the system is vulnerable.
Check Version:
Check CAS interface or configuration files for version information; specific command depends on installation.
Verify Fix Applied:
Confirm CAS version is 20221118.48 or 20230120.44 or later, and test that unauthorized file uploads to the deployment directory are blocked.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized file uploads to /batm/app/admin/standalone/deployments
- Unexpected Java process executions
- Failed authentication attempts to CAS admin interface
Network Indicators:
- Unusual outbound connections from CAS system
- Traffic to known malicious IPs
SIEM Query:
Example: search 'file_upload' AND path:'/batm/app/admin/standalone/deployments' OR 'CAS' AND 'unauthorized_access'
🔗 References
- https://arstechnica.com/information-technology/2023/03/hackers-drain-bitcoin-atms-of-1-5-million-by-exploiting-0-day-bug/
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS
- https://twitter.com/generalbytes/status/1637192687160897537
- https://web3isgoinggreat.com/single/general-bytes-crypto-atms-exploited-for-over-1-6-million
- https://www.bleepingcomputer.com/news/security/general-bytes-bitcoin-atms-hacked-using-zero-day-15m-stolen/
- https://www.generalbytes.com/en/support/changelog
- https://arstechnica.com/information-technology/2023/03/hackers-drain-bitcoin-atms-of-1-5-million-by-exploiting-0-day-bug/
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS
- https://twitter.com/generalbytes/status/1637192687160897537
- https://web3isgoinggreat.com/single/general-bytes-crypto-atms-exploited-for-over-1-6-million
- https://www.bleepingcomputer.com/news/security/general-bytes-bitcoin-atms-hacked-using-zero-day-15m-stolen/
- https://www.generalbytes.com/en/support/changelog