A series of critical vulnerabilities found within the ScrutisWeb ATM fleet monitoring software, developed by Iagona, have raised concerns over the potential for remote hacking of ATMs. Synack Red Team experts uncovered these security flaws, which were promptly addressed by the vendor in July 2023 with the release of ScrutisWeb version 2.1.38.
Furthermore, ScrutisWeb provides organizations the ability to remotely monitor banking and retail ATM fleets, allowing quick response to operational issues. Its functionalities include hardware monitoring, remote data modification, and even terminal reboot or shutdown. These vulnerabilities collectively assigned the CVE identifiers CVE-2023-33871, CVE-2023-38257, CVE-2023-35763, and CVE-2023-35189, encompass path traversal, authorization bypass, hardcoded cryptographic key, and arbitrary file upload issues that could potentially be exploited by remote attackers.
Malicious actors could potentially exploit these flaws to gain unauthorized access to the server, execute arbitrary commands, and decrypt encrypted administrator passwords using a hardcoded key. The vulnerabilities could enable unauthorized users to access the ScrutisWeb management console as an admin, potentially allowing them to monitor and manipulate ATM activities, enable management mode, upload files, and even perform reboots or shutdowns.
While the vulnerabilities have been patched, experts caution that the initial exposure highlights the risk of remote attacks on critical infrastructure, emphasizing the importance of rigorous security assessments and measures. The US Cybersecurity and Infrastructure Security Agency (CISA) has also issued an advisory, underlining the global implications of the vulnerabilities and urging organizations to take necessary precautions to safeguard their ATM fleets from potential exploitation.