Tuesday, March 4, 2025
HomeCyber Security NewsIRCTC Free Insurance Bug That Puts Millions of Passenger Data Under Risk

IRCTC Free Insurance Bug That Puts Millions of Passenger Data Under Risk

Published on

SIEM as a Service

Follow Us on Google News

IRCTC fixed a critical security bug that allows attackers to steal passengers private information such as name, age, gender and insurance without user consent.

It appears the vulnerability for more than two years, security researcher Avinash Jain found the vulnerability exists both with the IRCTC’s website and app that connects with the third party free insurance service.

According to the Economic Times report, the bug was reported to IRCTC on August 14 and it was fixed on August 29.

Within 10 minutes (after finding the bug) we were able to read almost 1,000 passenger and nominee information,” said Jain to Economic Times.

Three companies offering travel insurance service to IRCTC including ICICI Lombard General Insurance, Royal Sundaram General Insurance, and Shriram General Insurance.

The bug affects only the linkage to transact with the insurance company Shriram General Insurance and others are not affected.

After the booking of ticket, the nomination details to be filled at respective
Insurance Company site and encrypted transaction ID generated for the passengers.

Now in order to fetch the passenger details, we need to have Transaction ID or PNR number, but Jain said they able to fetch passenger details by decoding the transaction ID/PNR using brute force methods.

IRCTC issues more than 700,000 tickets every day, among that more than 62% of tickets are booked online.

Related Read

20,000 Users Affected With Air Canada Mobile App Data Breach

British Airways Hacked – More than 380,000 Payment Cards Compromised

Ransomware Attack Hits Bristol Airport, Flight Display Screens Went Offline

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...