CVE-2023-47024

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in NCR Terminal Handler v1.5.1 allows attackers to perform one-click account takeover by exploiting weak security controls in an undisclosed WSDL function. Attackers can craft malicious requests that execute unauthorized actions when victims visit specially crafted web pages. Organizations using NCR Terminal Handler v1.5.1 are affected.

💻 Affected Systems

Products:
  • NCR Terminal Handler
Versions: v1.5.1
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability involves an undisclosed function in the WSDL with weak security controls that accepts custom content types.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of terminal handler accounts leading to unauthorized access to sensitive systems, potential data theft, and lateral movement within the network.

🟠

Likely Case

Unauthorized account access allowing attackers to modify configurations, access sensitive data, or disrupt terminal operations.

🟢

If Mitigated

Limited impact with proper CSRF protections, though other vulnerabilities in the WSDL function might still pose risks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (clicking a malicious link) but is straightforward once the malicious request is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Monitor NCR for security updates and apply immediately when released.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing requests in the Terminal Handler application.

Restrict WSDL Access

all

Disable or restrict access to the vulnerable WSDL function if not required for operations.

🧯 If You Can't Patch

  • Implement network segmentation to isolate Terminal Handler from untrusted networks
  • Deploy web application firewall (WAF) with CSRF protection rules

🔍 How to Verify

Check if Vulnerable:

Check if running NCR Terminal Handler v1.5.1 and review WSDL functions for weak security controls on custom content types.

Check Version:

Check application documentation or configuration files for version information

Verify Fix Applied:

Verify that CSRF tokens are implemented and WSDL functions have proper security controls when updates become available.

📡 Detection & Monitoring

Log Indicators:

  • Unusual account access patterns
  • Requests to WSDL functions with custom content types
  • Failed authentication attempts followed by successful ones

Network Indicators:

  • HTTP POST requests to Terminal Handler endpoints without CSRF tokens
  • Requests with unusual content-type headers

SIEM Query:

source="terminal_handler" AND (http_method="POST" AND NOT csrf_token=*) OR (content_type="custom/*")

🔗 References

📤 Share & Export