CVE-2023-47297

9.8 CRITICAL

📋 TL;DR

A settings manipulation vulnerability in NCR Terminal Handler v1.5.1 allows attackers to execute arbitrary commands with elevated privileges, including modifying system security auditing configurations. This affects organizations using NCR Terminal Handler v1.5.1 for point-of-sale or terminal management systems. Attackers can exploit this to gain unauthorized system access and potentially compromise the entire environment.

💻 Affected Systems

Products:
  • NCR Terminal Handler
Versions: v1.5.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of NCR Terminal Handler v1.5.1. Systems using this version for terminal management are vulnerable regardless of specific configuration settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, disable security controls, exfiltrate sensitive data, and establish persistent backdoors across the network.

🟠

Likely Case

Attackers gain administrative access to affected systems, manipulate security settings, and potentially pivot to other systems in the network.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege access, and monitoring in place, though the vulnerability still presents significant risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but is relatively straightforward once initial access is obtained. The vulnerability allows privilege escalation and arbitrary command execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.5.2 or later

Vendor Advisory: https://www.ncr.com/security-advisories

Restart Required: Yes

Instructions:

1. Download the latest version from NCR's official distribution channels. 2. Backup current configuration and data. 3. Uninstall v1.5.1. 4. Install v1.5.2 or later. 5. Restart the system. 6. Verify the installation and restore configurations if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate NCR Terminal Handler systems from critical network segments and restrict access to necessary ports only.

Access Control Restrictions

windows

Implement strict access controls and limit user privileges to only necessary functions.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected systems from critical infrastructure
  • Deploy application allowlisting to prevent execution of unauthorized commands and binaries

🔍 How to Verify

Check if Vulnerable:

Check the installed version of NCR Terminal Handler. If version is 1.5.1, the system is vulnerable.

Check Version:

Check the application properties or installation directory for version information, or use: wmic product where name="NCR Terminal Handler" get version

Verify Fix Applied:

Verify that NCR Terminal Handler version is 1.5.2 or later and test that settings manipulation no longer allows arbitrary command execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation events from NCR Terminal Handler
  • Modifications to security auditing configurations
  • Unexpected command execution with elevated privileges

Network Indicators:

  • Unusual outbound connections from NCR Terminal Handler systems
  • Traffic to unexpected ports or IP addresses

SIEM Query:

source="NCR Terminal Handler" AND (event_type="process_creation" OR event_type="registry_modification") AND user="SYSTEM" OR user="Administrator"

🔗 References

📤 Share & Export