CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to escalate privileges via a crafted POST request to the grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization SOAP API component.
Analysis
CVE-2023-47031 is a critical privilege escalation vulnerability in NCR Terminal Handler v1.5.1 that allows unauthenticated remote attackers to gain administrative privileges by crafting malicious POST requests to SOAP API endpoints (grantRolesToUsers, grantRolesToGroups, grantRolesToOrganization). With a CVSS score of 9.8 and attack vector requiring no authentication or user interaction, this vulnerability poses an immediate threat to exposed NCR Terminal Handler installations. The vulnerability has been confirmed with public disclosure and is listed in CISA's Known Exploited Vulnerabilities catalog, indicating active exploitation in the wild.
Technical Context
The vulnerability exists in the SOAP API component of NCR Terminal Handler, specifically in the role-granting functionality. The root cause is classified as CWE-284 (Improper Access Control), indicating that the SOAP endpoints fail to properly validate user privileges before processing role assignment requests. SOAP (Simple Object Access Protocol) services, traditionally reliant on XML parsing and WS-Security mechanisms, require robust authorization checks on each operation. In this case, the grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization endpoints lack sufficient access controls, allowing unauthenticated or low-privileged users to invoke administrative functions. The affected product is NCR Terminal Handler v1.5.1 (CPE likely: cpe:2.3:a:ncr:terminal_handler:1.5.1:*:*:*:*:*:*:*), a critical component in NCR's point-of-sale and transaction processing infrastructure. The SOAP API exposure suggests these endpoints are accessible over HTTP/HTTPS without adequate WS-Security policies or role-based access control validation.
Affected Products
NCR Terminal Handler (['1.5.1'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2023-51187