CVE-2024-1578

5.3 MEDIUM

📋 TL;DR

A firmware fault in MiCard PLUS card readers causes random character drops during ID card reads, potentially assigning wrong card numbers during self-registration. This compromises ID card uniqueness and can cause failed logins for end-users. Organizations using rf IDEAS/NT-ware MiCard PLUS readers with ID card self-registration are affected.

💻 Affected Systems

Products:
  • MiCard PLUS Ci
  • MiCard PLUS BLE
Versions: All firmware versions prior to fix
Operating Systems: Any OS using these readers
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using 'ID card self-registration' function. Standard authentication without self-registration may not be impacted.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Multiple users get assigned duplicate ID card numbers, allowing unauthorized access through credential confusion or privilege escalation if card numbers are tied to permissions.

🟠

Likely Case

Intermittent login failures for legitimate users due to mismatched card numbers, causing helpdesk burden and user frustration.

🟢

If Mitigated

Minor operational disruption with occasional failed authentications that require manual intervention.

🌐 Internet-Facing: LOW - These are physical card readers typically deployed internally, not directly internet-exposed.
🏢 Internal Only: MEDIUM - Affects authentication reliability for internal systems using these readers, potentially allowing unauthorized access if duplicate card numbers are assigned.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires physical access to card readers and depends on random character drop occurrences. Not a targeted attack but a reliability issue that creates security implications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://ntware.atlassian.net/wiki/spaces/SA/pages/11973853216/2024+Security+Advisory+Multiple+MiCard+PLUS+card+reader+dropped+characters

Restart Required: Yes

Instructions:

1. Check current firmware version on MiCard PLUS readers. 2. Download updated firmware from vendor. 3. Apply firmware update following vendor instructions. 4. Reboot readers after update. 5. Verify fix by testing card reads.

🔧 Temporary Workarounds

Disable ID Card Self-Registration

all

Turn off the self-registration function to prevent wrong card number assignments

Consult device configuration manual for specific commands

Implement Manual Registration

all

Use administrative tools to manually register ID cards instead of self-registration

🧯 If You Can't Patch

  • Disable ID card self-registration function entirely
  • Implement secondary authentication factor to compensate for potential card read errors

🔍 How to Verify

Check if Vulnerable:

Check if using MiCard PLUS Ci or BLE readers with ID card self-registration enabled. Test multiple card reads to observe character drops.

Check Version:

Consult device documentation for firmware check command (typically through device management interface)

Verify Fix Applied:

After firmware update, perform multiple test card reads and verify all characters are consistently captured. Check firmware version matches patched version.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts from same user
  • Authentication logs showing inconsistent card numbers
  • User complaints about card readers not working consistently

Network Indicators:

  • Increased authentication failure rates from card reader systems

SIEM Query:

source="card_reader_logs" AND (event="authentication_failure" OR event="card_read_error") | stats count by user, card_number

🔗 References

📤 Share & Export