CVE-2023-47031
📋 TL;DR
This vulnerability allows remote attackers to escalate privileges in NCR Terminal Handler v1.5.1 by sending crafted POST requests to specific SOAP API endpoints. Attackers can grant themselves administrative roles without authentication, potentially taking full control of affected systems. Organizations using NCR Terminal Handler v1.5.1 are affected.
💻 Affected Systems
- NCR Terminal Handler
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where attackers gain administrative privileges, potentially accessing sensitive data, modifying configurations, and deploying malware across the network.
Likely Case
Attackers gain administrative access to the Terminal Handler system, allowing them to manipulate terminal operations, access sensitive transaction data, and potentially pivot to other systems.
If Mitigated
With proper network segmentation and API access controls, impact is limited to the Terminal Handler system only, preventing lateral movement.
🎯 Exploit Status
Exploitation requires sending crafted POST requests to specific SOAP endpoints, which is relatively straightforward for attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: http://ncr.com
Restart Required: No
Instructions:
1. Check NCR website for security advisories
2. Apply any available patches
3. Verify SOAP API endpoints are secured
🔧 Temporary Workarounds
Restrict SOAP API Access
allBlock or restrict access to vulnerable SOAP API endpoints (grantRolesToUsers, grantRolesToGroups, grantRolesToOrganization)
Use firewall rules to block POST requests to /soap-api/* endpoints
Configure web server to restrict access to specific IPs
Implement API Authentication
allAdd authentication requirements for all SOAP API endpoints
Configure web server authentication for /soap-api/* paths
Implement API key authentication
🧯 If You Can't Patch
- Isolate the Terminal Handler system in a separate network segment with strict access controls
- Implement network monitoring and alerting for suspicious POST requests to SOAP API endpoints
🔍 How to Verify
Check if Vulnerable:
Check if NCR Terminal Handler v1.5.1 is installed and if SOAP API endpoints are accessible without authentication
Check Version:
Check application version in web interface or configuration files
Verify Fix Applied:
Test that POST requests to grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization endpoints now require proper authentication
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to SOAP API endpoints
- Multiple failed authentication attempts followed by successful role grants
- User privilege escalation logs
Network Indicators:
- POST requests to /soap-api/grantRoles* endpoints from unexpected sources
- Unusual traffic patterns to Terminal Handler system
SIEM Query:
source="web_server" AND (uri="/soap-api/grantRolesToUsers" OR uri="/soap-api/grantRolesToGroups" OR uri="/soap-api/grantRolesToOrganization") AND http_method="POST"