Monday, March 3, 2025
HomeSecurity NewsSecurity Bug Affected 300,000 Oracle Point of Sale Systems Puts the Critical...

Security Bug Affected 300,000 Oracle Point of Sale Systems Puts the Critical Business Data at Risk

Published on

SIEM as a Service

Follow Us on Google News

Oracle POS Systems widely used in food and beverage solutions affected by a Security Bug that allows attackers to gain full access to the business data.

Security researchers from ERPScan detected directory traversal vulnerability (CVE-2018-2636) in Oracle MICROS EGateway Application Service. Oracle issued a security patch for the vulnerability starting January 2018.

The Flaw allows attackers to steal numerous configuration files including logs and the files SimphonyInstall.xml or Dbconfix.xml that contains the usernames and encrypted passwords to connect to DB.

Chastuhin says the attacker can snatch DB usernames and password hashes, brute them and gain full access to the DB with all business data. There are several ways of its exploitation, leading to the whole MICROS system compromise.

Attackers can install POS malware to collect the payment card details and other malware to launch a cyber attack. An attacker can enter into shop distract the shopkeeper and can connect the Raspberry PI to discover a POS system and to execute malicious scripts.

If you believe that gaining access to POS URL is a snap, bear in mind that hackers can find digital scales or other devices that use RJ45, connect it to Raspberry PI, and scan the internal network. That is where they easily discover a POS system. Remember this fact when you pop into a store, researchers said.

According to Shodan more than 170 POS systems available online, attackers can exploit them remotely via crafted HTTP requests if they are not patched.

Oracle POS systems

Mitigation – Oracle POS Systems

Oracle published a patch for the vulnerability along with Spectre and Meltdown processor vulnerabilities.It is highly recommended to contact your vendor in applying security patches.

Researchers published a PoC python script to check that your environment has no such vulnerabilities.

Last November FOREVER 21 suffered a data breach attackers installed POS malware to track and read data from a payment card as it was being routed through the POS device

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Google Launches Shielded Email to Keep Your Address Hidden from Apps

Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps...

Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware

Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage...

JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks

Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations...

New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data

A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Check Point Software to Open First Asia-Pacific R&D Centre in Bengaluru, India

Check Point Software Technologies Ltd. has announced plans to establish its inaugural Asia-Pacific Research...

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of...