Published in News

Point of Sale terminals insecure for at least a decade

by on14 December 2020


PoS security

Two of the biggest manufacturers of PoS devices made products which could have allowed cyber criminals to steal credit card details, clone terminals and commit other forms of financial fraud at the cost of both buyers and retailers.

The vulnerabilities in Verifone and Ingenico products – which are used in millions of stores around the world – have been detailed by independent researcher Aleksei Stennikov and Timur Yunusov, head of offensive security research at Cyber R&D Lab, during a presentation at Black Hat Europe 2020.

The vulnerabilities can now be fixed by applying security patches – although it can't be certain at all if retailers and others involved in the distribution and use of the PoS terminals have applied the updates.

One of the key vulnerabilities in both brands of device is the use of default passwords that could provider attackers with access to a service menu and the ability to manipulate or change the code on the machines in order to run malicious commands.

Researchers say these security issues have existed for at least 10 years while some have even existed in one form or another for up to 20 years – although the latter are mostly in legacy elements of the device that are no longer used.

Tim Callan, Chief Compliance Officer at Sectigo, said: “The bottom line is that usernames and passwords are not a safe method for authentication, whether for PoS terminals or social media accounts. Consumers and enterprises still struggle to change their reliance on the password model. This latest vulnerability underlines just how flawed the model is, as one insecure device protected by a default password on a connected network makes every connected device vulnerable. That is why many device manufacturers are moving to stronger authentication models like PKI.”

 

Last modified on 14 December 2020
Rate this item
(0 votes)