makspogonii - Fotolia
An ERPScan security researcher discovered a flaw that enables the installation of point-of-sale malware on Oracle...
Micros POS systems. How serious is this flaw?
As malware and botnets that attack mobile devices seem to be going out of favor with attackers, the bad guys are shifting their attention back to point-of-sale (POS) systems.
Attackers like to target POS systems, such as Oracle Micros POS, because they process payment data and are pervasively deployed. Malware targeting POS systems, including RAM scrapers, have been detected more and more over the last several years after they received increased attention in the PCI DSS specification.
Recently, ERPScan B.V. found a vulnerability in Oracle's Micros POS that could be used to gain access to the POS system. The vulnerability, CVE-2018-2636, was initially -- and innocuously -- classified as a directory traversal bug.
However, the vulnerability is much more serious, as an attacker can download any file -- including the main configuration file -- containing username and password information. With this information, an attacker can connect to a server to gain access to data or to use credentials for lateral access to the network.
ERPscan identified 170 systems on the internet that might be vulnerable to this attack. However, an attacker with access to a wireless network or an open network port on the target's network could also exploit the vulnerability.
Oracle released a patch for Oracle Micros POS in the January 2018 Critical Patch Update, and it should be installed to maintain the security of POS environments.
Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Dig Deeper on Threats and vulnerabilities
Related Q&A from Nick Lewis
Port scans provide data on how networks operate. In the wrong hands, this info could be part of a larger malicious scheme. Learn how to detect and ... Continue Reading
Cloud penetration testing presents new challenges for information security teams. Here's how a playbook from the Cloud Security Alliance can help ... Continue Reading
Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and... Continue Reading