Saturday, April 5, 2025
HomeSecurity NewsSecurity Bug Affected 300,000 Oracle Point of Sale Systems Puts the Critical...

Security Bug Affected 300,000 Oracle Point of Sale Systems Puts the Critical Business Data at Risk

Published on

SIEM as a Service

Follow Us on Google News

Oracle POS Systems widely used in food and beverage solutions affected by a Security Bug that allows attackers to gain full access to the business data.

Security researchers from ERPScan detected directory traversal vulnerability (CVE-2018-2636) in Oracle MICROS EGateway Application Service. Oracle issued a security patch for the vulnerability starting January 2018.

The Flaw allows attackers to steal numerous configuration files including logs and the files SimphonyInstall.xml or Dbconfix.xml that contains the usernames and encrypted passwords to connect to DB.

Chastuhin says the attacker can snatch DB usernames and password hashes, brute them and gain full access to the DB with all business data. There are several ways of its exploitation, leading to the whole MICROS system compromise.

Attackers can install POS malware to collect the payment card details and other malware to launch a cyber attack. An attacker can enter into shop distract the shopkeeper and can connect the Raspberry PI to discover a POS system and to execute malicious scripts.

If you believe that gaining access to POS URL is a snap, bear in mind that hackers can find digital scales or other devices that use RJ45, connect it to Raspberry PI, and scan the internal network. That is where they easily discover a POS system. Remember this fact when you pop into a store, researchers said.

According to Shodan more than 170 POS systems available online, attackers can exploit them remotely via crafted HTTP requests if they are not patched.

Oracle POS systems

Mitigation – Oracle POS Systems

Oracle published a patch for the vulnerability along with Spectre and Meltdown processor vulnerabilities.It is highly recommended to contact your vendor in applying security patches.

Researchers published a PoC python script to check that your environment has no such vulnerabilities.

Last November FOREVER 21 suffered a data breach attackers installed POS malware to track and read data from a payment card as it was being routed through the POS device

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...

Enhancing Satellite Security by Encrypting Video Data Directly on Payloads

The rapid expansion of low-Earth orbit (LEO) satellite constellations has underscored the need for...