CVE-2025-61429

8.8 HIGH

📋 TL;DR

This vulnerability in NCR Atleos Terminal Manager (ConfigApp) v3.4.0 allows attackers to escalate privileges through specially crafted requests. Attackers could gain administrative access to the terminal management system. Organizations using this specific version of NCR's terminal management software are affected.

💻 Affected Systems

Products:
  • NCR Atleos Terminal Manager (ConfigApp)
Versions: v3.4.0
Operating Systems: Not specified, likely Windows/Linux server environments
Default Config Vulnerable: ⚠️ Yes
Notes: Only version 3.4.0 is confirmed affected. Earlier or later versions may also be vulnerable but not confirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of terminal management system allowing attackers to reconfigure terminals, steal payment data, or deploy malware across the terminal network.

🟠

Likely Case

Unauthorized administrative access to terminal management console leading to configuration changes, data access, and potential lateral movement.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though privilege escalation would still be possible.

🌐 Internet-Facing: HIGH if ConfigApp is exposed to internet, as attackers could directly exploit without internal access.
🏢 Internal Only: HIGH as authenticated users or attackers with internal network access could exploit to gain admin privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires some level of access to the system (authenticated or network access). Crafted request suggests manipulation of API/network calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

1. Contact NCR support for patch availability. 2. If patch exists, download from NCR portal. 3. Apply patch following NCR documentation. 4. Verify installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate ConfigApp server from untrusted networks and limit access to authorized users only.

Access Control Hardening

all

Implement strict authentication and authorization controls, including multi-factor authentication.

🧯 If You Can't Patch

  • Implement network segmentation to isolate ConfigApp from other critical systems
  • Enable detailed logging and monitoring for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check ConfigApp version via application interface or configuration files. Look for version 3.4.0.

Check Version:

Check application interface or consult NCR documentation for version checking method.

Verify Fix Applied:

Verify version is no longer 3.4.0 after applying vendor patch or upgrading.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts
  • Multiple failed authentication followed by successful admin access
  • Configuration changes from non-admin users

Network Indicators:

  • Crafted HTTP requests to ConfigApp endpoints
  • Unusual API calls to privilege-related functions

SIEM Query:

source="ConfigApp" AND (event_type="privilege_escalation" OR user_role_change="admin")

🔗 References

📤 Share & Export