Ingenico Telium 2 POS terminals allow arbitrary code execution via the TRACE protocol. This is fixed in Telium 2 SDK v9.32.03 patch N.
References
Link | Resource |
---|---|
https://ingenico.us/smart-terminals/telium2 | Product |
https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2020-18/ | Third Party Advisory |
https://youtu.be/gtbS3Gr264w | Exploit Third Party Advisory |
https://youtu.be/oyUD7RDJsJs | Exploit Third Party Advisory |
https://ingenico.us/smart-terminals/telium2 | Product |
https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2020-18/ | Third Party Advisory |
https://youtu.be/gtbS3Gr264w | Exploit Third Party Advisory |
https://youtu.be/oyUD7RDJsJs | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://ingenico.us/smart-terminals/telium2 - Product | |
References | () https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2020-18/ - Third Party Advisory | |
References | () https://youtu.be/gtbS3Gr264w - Exploit, Third Party Advisory | |
References | () https://youtu.be/oyUD7RDJsJs - Exploit, Third Party Advisory |
Information
Published : 2020-09-09 19:15
Updated : 2024-11-21 03:54
NVD link : CVE-2018-17772
Mitre link : CVE-2018-17772
CVE.ORG link : CVE-2018-17772
JSON object : View
Products Affected
ingenico
- telium_2
- telium_2_firmware
CWE