IRCTC Free Insurance Bug That Puts Millions of Passenger Data Under Risk

IRCTC fixed a critical security bug that allows attackers to steal passengers private information such as name, age, gender and insurance without user consent.

It appears the vulnerability for more than two years, security researcher Avinash Jain found the vulnerability exists both with the IRCTC’s website and app that connects with the third party free insurance service.

According to the Economic Times report, the bug was reported to IRCTC on August 14 and it was fixed on August 29.

Within 10 minutes (after finding the bug) we were able to read almost 1,000 passenger and nominee information,” said Jain to Economic Times.

Three companies offering travel insurance service to IRCTC including ICICI Lombard General Insurance, Royal Sundaram General Insurance, and Shriram General Insurance.

The bug affects only the linkage to transact with the insurance company Shriram General Insurance and others are not affected.

After the booking of ticket, the nomination details to be filled at respective
Insurance Company site and encrypted transaction ID generated for the passengers.

Now in order to fetch the passenger details, we need to have Transaction ID or PNR number, but Jain said they able to fetch passenger details by decoding the transaction ID/PNR using brute force methods.

IRCTC issues more than 700,000 tickets every day, among that more than 62% of tickets are booked online.

Related Read

20,000 Users Affected With Air Canada Mobile App Data Breach

British Airways Hacked – More than 380,000 Payment Cards Compromised

Ransomware Attack Hits Bristol Airport, Flight Display Screens Went Offline

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

PAN-OS DoS Vulnerability Allows Attackers to Force Repeated Firewall Reboots

A newly disclosed denial-of-service (DoS) vulnerability in Palo Alto Networks’ PAN-OS software enables attackers to…

1 hour ago

Linux Firewall IPFire 2.29 Launches with Post-Quantum Encryption and System Enhancements

The open-source Linux firewall solution, IPFire, has officially released its latest version, IPFire 2.29 - Core Update…

2 hours ago

‘RemoteMonologue’ New Red Team Technique Exploits DCOM To Steal NTLM Credentials Remotely

A sophisticated new red team technique dubbed "RemoteMonologue" has emerged, enabling attackers to remotely harvest…

2 hours ago

OpenSSH 10.0 Released: New Protocol Changes and Key Security Improvements

The OpenSSH team has announced the release of OpenSSH 10.0 on April 9, marking an important milestone…

2 hours ago

PAN-OS Command Injection Flaw Lets Hackers Execute Arbitrary Code Remotely

Palo Alto Networks has disclosed a medium-severity vulnerability (CVE-2025-0127) in its PAN-OS software, enabling authenticated…

2 hours ago

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking cybercriminal…

12 hours ago