Skip to main content

CVE-2024-0674: CWE-269 Improper Privilege Management in Lamassu Bitcoin ATM Douro machines

Medium
VulnerabilityCVE-2024-0674cvecve-2024-0674cwe-269
Published: Tue Jan 30 2024 (01/30/2024, 12:19:00 UTC)
Source: CVE Database V5
Vendor/Project: Lamassu
Product: Bitcoin ATM Douro machines

Description

Privilege escalation vulnerability in Lamassu Bitcoin ATM Douro machines, in its 7.1 version, which could allow a local user to acquire root permissions by modifying the updatescript.js, inserting special code inside the script and creating the done.txt file. This would cause the watchdog process to run as root and execute the payload stored in the updatescript.js.

AI-Powered Analysis

AILast updated: 07/08/2025, 01:13:24 UTC

Technical Analysis

CVE-2024-0674 is a privilege escalation vulnerability identified in Lamassu Bitcoin ATM Douro machines running version 7.1. The vulnerability stems from improper privilege management (CWE-269) within the update mechanism of these ATM devices. Specifically, a local user with limited privileges can manipulate the update process by modifying the updatescript.js file, inserting malicious code, and creating a done.txt file. This manipulation causes the watchdog process, which normally runs with elevated privileges, to execute the attacker-controlled updatescript.js payload as the root user. Consequently, the attacker can escalate their privileges from a low-privileged local user to root, gaining full control over the ATM system. The vulnerability requires local access to the machine and a high level of attack complexity, as indicated by the CVSS vector (AV:P/AC:H/PR:L/UI:N). There is no indication of known exploits in the wild at this time. The vulnerability impacts confidentiality, integrity, and availability, as root access allows an attacker to extract sensitive data, modify system configurations, or disrupt ATM operations. The lack of a patch link suggests that a fix may not yet be publicly available or that users must coordinate directly with Lamassu for remediation. This vulnerability highlights a critical security weakness in the update mechanism of financial transaction devices, which are attractive targets for attackers due to their role in cryptocurrency exchanges and cash handling.

Potential Impact

For European organizations operating Lamassu Bitcoin ATM Douro machines, this vulnerability poses significant risks. An attacker with local access could gain root privileges, potentially leading to theft of cryptocurrency, manipulation of transaction records, or complete disruption of ATM services. This could result in financial losses, reputational damage, and regulatory scrutiny under European data protection and financial regulations. The ability to execute arbitrary code as root also raises concerns about the ATM being used as a pivot point for broader network compromise, especially if the ATM is connected to internal networks. Given the increasing adoption of cryptocurrency ATMs in Europe, particularly in major financial hubs, the vulnerability could affect both operators and users. The medium CVSS score reflects the requirement for local access and high attack complexity, somewhat limiting the scope but not eliminating the threat, especially in environments with insufficient physical security controls.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Restrict physical and local access to Lamassu Bitcoin ATM Douro machines to authorized personnel only, employing access controls such as locks, surveillance, and tamper-evident seals. 2) Monitor and audit local user activities on the ATM machines to detect unauthorized file modifications, particularly to updatescript.js and the presence of done.txt files. 3) Employ file integrity monitoring solutions to alert on unexpected changes to critical update scripts. 4) Coordinate with Lamassu to obtain and apply any available patches or firmware updates addressing this vulnerability as soon as they are released. 5) If patches are not yet available, consider disabling or restricting the update mechanism temporarily or implementing additional validation checks on update scripts to prevent unauthorized code execution. 6) Segment ATM networks from critical internal networks to limit lateral movement in case of compromise. 7) Train staff on the risks associated with local access vulnerabilities and enforce strict operational security policies around ATM maintenance and updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2024-01-18T11:38:15.095Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683879c8182aa0cae282966e

Added to database: 5/29/2025, 3:14:16 PM

Last enriched: 7/8/2025, 1:13:24 AM

Last updated: 8/16/2025, 10:11:11 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats