CVE-2023-47031

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to escalate privileges in NCR Terminal Handler v1.5.1 by sending crafted POST requests to specific SOAP API endpoints. Attackers can grant themselves administrative roles without authentication, potentially taking full control of affected systems. Organizations using NCR Terminal Handler v1.5.1 are affected.

💻 Affected Systems

Products:
  • NCR Terminal Handler
Versions: v1.5.1
Operating Systems: Not specified, likely Windows/Linux server environments
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with SOAP API endpoints exposed and accessible to attackers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative privileges, potentially accessing sensitive data, modifying configurations, and deploying malware across the network.

🟠

Likely Case

Attackers gain administrative access to the Terminal Handler system, allowing them to manipulate terminal operations, access sensitive transaction data, and potentially pivot to other systems.

🟢

If Mitigated

With proper network segmentation and API access controls, impact is limited to the Terminal Handler system only, preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted POST requests to specific SOAP endpoints, which is relatively straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: http://ncr.com

Restart Required: No

Instructions:

1. Check NCR website for security advisories
2. Apply any available patches
3. Verify SOAP API endpoints are secured

🔧 Temporary Workarounds

Restrict SOAP API Access

all

Block or restrict access to vulnerable SOAP API endpoints (grantRolesToUsers, grantRolesToGroups, grantRolesToOrganization)

Use firewall rules to block POST requests to /soap-api/* endpoints
Configure web server to restrict access to specific IPs

Implement API Authentication

all

Add authentication requirements for all SOAP API endpoints

Configure web server authentication for /soap-api/* paths
Implement API key authentication

🧯 If You Can't Patch

  • Isolate the Terminal Handler system in a separate network segment with strict access controls
  • Implement network monitoring and alerting for suspicious POST requests to SOAP API endpoints

🔍 How to Verify

Check if Vulnerable:

Check if NCR Terminal Handler v1.5.1 is installed and if SOAP API endpoints are accessible without authentication

Check Version:

Check application version in web interface or configuration files

Verify Fix Applied:

Test that POST requests to grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization endpoints now require proper authentication

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to SOAP API endpoints
  • Multiple failed authentication attempts followed by successful role grants
  • User privilege escalation logs

Network Indicators:

  • POST requests to /soap-api/grantRoles* endpoints from unexpected sources
  • Unusual traffic patterns to Terminal Handler system

SIEM Query:

source="web_server" AND (uri="/soap-api/grantRolesToUsers" OR uri="/soap-api/grantRolesToGroups" OR uri="/soap-api/grantRolesToOrganization") AND http_method="POST"

🔗 References

📤 Share & Export