Sept. 8, 2022, midnight |

SpiderLabs Blog from Trustwave www.trustwave.com

During testing on NCR ATMs, Trustwave SpiderLabs identified vulnerabilities that allowed for the ability to escape into the ATM’s file system and perform arbitrary file read/write. The ability to write files was escalated into arbitrary code execution, and subsequently, a reverse shell was obtained. Then, remote code execution was performed.

atm code code execution escape file system heist remote code execution system

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Compliance Architect - Experian Health (Can be REMOTE from anywhere in the US)

@ Experian | ., ., United States

IT Security Specialist

@ Ørsted | Kuala Lumpur, MY

Senior, Cyber Security Analyst

@ Peloton | New York City

Cyber Security Engineer | Perimeter | Firewall

@ Garmin Cluj | Cluj-Napoca, Cluj County, Romania

Pentester / Ethical Hacker Web/API - Vast/Freelance

@ Resillion | Brussels, Belgium