CVE-2025-8699: CWE-922 Insecure Storage of Sensitive Information in KioSoft Stored Value Unattended Payment Solution
Some "Stored Value" Unattended Payment Solutions of KioSoft use vulnerable NFC cards. Attackers could potentially use this vulnerability to change the balance on the cards and generate money. The account balance is stored on an insecure MiFare Classic NFC card and can be read and written back. By carefully observing changes in card dumps, one can identify fields that store the cash value of the card. Additionally, a checksum can be identified, which is created by XOR-ing the cash and an unknown field with a certain value. By updating the fields accordingly, arbitrary amounts of money can be loaded onto the card (up to $655,35) to pay for goods.
AI Analysis
Technical Summary
CVE-2025-8699 is a critical vulnerability affecting KioSoft's Stored Value Unattended Payment Solution, which relies on MiFare Classic NFC cards to store account balances. The vulnerability arises from insecure storage of sensitive information (CWE-922) on these NFC cards. Specifically, the balance data is stored directly on the card without adequate cryptographic protection, allowing attackers to read and write the stored value. By analyzing multiple card dumps, attackers can identify the exact fields representing the cash balance and the checksum mechanism, which is computed by XOR-ing the cash value with an unknown field and a constant. This knowledge enables attackers to manipulate the card data and update the balance arbitrarily, potentially loading up to $65,535 onto the card. The vulnerability requires no authentication or user interaction and can be exploited remotely via NFC communication. The CVSS 3.1 score of 9.1 reflects the high impact on confidentiality and integrity, with network attack vector, low attack complexity, and no privileges or user interaction required. Although no known exploits are currently reported in the wild, the simplicity of the attack and the widespread use of MiFare Classic cards in unattended payment systems make this a significant threat. The lack of available patches as of the publication date further exacerbates the risk.
Potential Impact
For European organizations deploying KioSoft's Stored Value Unattended Payment Solutions, this vulnerability poses a severe financial risk. Attackers can fraudulently increase card balances, leading to direct monetary losses for merchants and service providers. The integrity of payment transactions is compromised, undermining trust in unattended payment infrastructure. Additionally, widespread exploitation could disrupt operations in sectors relying on these payment solutions, such as public transportation, vending machines, parking services, and event ticketing. The confidentiality breach, while less critical than integrity loss, could expose transaction patterns or user data stored on the cards. The vulnerability's ease of exploitation and lack of authentication requirements mean that attackers can operate anonymously and at scale, potentially causing significant economic damage and reputational harm to affected organizations across Europe.
Mitigation Recommendations
Immediate mitigation should focus on replacing or upgrading the insecure MiFare Classic NFC cards with more secure alternatives that implement strong cryptographic protections, such as MiFare DESFire EV2 or EV3 cards. Organizations should work closely with KioSoft to obtain firmware or hardware updates that address the insecure storage issue. Until patches or replacements are available, deploying additional security controls is advisable, such as limiting the acceptance of stored value cards to those verified through backend validation mechanisms rather than relying solely on card-stored balances. Implementing transaction monitoring to detect anomalous spending patterns can help identify fraudulent activity early. Physical security measures to restrict unauthorized NFC access to unattended payment terminals should be enhanced. Finally, educating staff and users about the risks and encouraging prompt reporting of suspicious card behavior will aid in early detection and response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-8699: CWE-922 Insecure Storage of Sensitive Information in KioSoft Stored Value Unattended Payment Solution
Description
Some "Stored Value" Unattended Payment Solutions of KioSoft use vulnerable NFC cards. Attackers could potentially use this vulnerability to change the balance on the cards and generate money. The account balance is stored on an insecure MiFare Classic NFC card and can be read and written back. By carefully observing changes in card dumps, one can identify fields that store the cash value of the card. Additionally, a checksum can be identified, which is created by XOR-ing the cash and an unknown field with a certain value. By updating the fields accordingly, arbitrary amounts of money can be loaded onto the card (up to $655,35) to pay for goods.
AI-Powered Analysis
Technical Analysis
CVE-2025-8699 is a critical vulnerability affecting KioSoft's Stored Value Unattended Payment Solution, which relies on MiFare Classic NFC cards to store account balances. The vulnerability arises from insecure storage of sensitive information (CWE-922) on these NFC cards. Specifically, the balance data is stored directly on the card without adequate cryptographic protection, allowing attackers to read and write the stored value. By analyzing multiple card dumps, attackers can identify the exact fields representing the cash balance and the checksum mechanism, which is computed by XOR-ing the cash value with an unknown field and a constant. This knowledge enables attackers to manipulate the card data and update the balance arbitrarily, potentially loading up to $65,535 onto the card. The vulnerability requires no authentication or user interaction and can be exploited remotely via NFC communication. The CVSS 3.1 score of 9.1 reflects the high impact on confidentiality and integrity, with network attack vector, low attack complexity, and no privileges or user interaction required. Although no known exploits are currently reported in the wild, the simplicity of the attack and the widespread use of MiFare Classic cards in unattended payment systems make this a significant threat. The lack of available patches as of the publication date further exacerbates the risk.
Potential Impact
For European organizations deploying KioSoft's Stored Value Unattended Payment Solutions, this vulnerability poses a severe financial risk. Attackers can fraudulently increase card balances, leading to direct monetary losses for merchants and service providers. The integrity of payment transactions is compromised, undermining trust in unattended payment infrastructure. Additionally, widespread exploitation could disrupt operations in sectors relying on these payment solutions, such as public transportation, vending machines, parking services, and event ticketing. The confidentiality breach, while less critical than integrity loss, could expose transaction patterns or user data stored on the cards. The vulnerability's ease of exploitation and lack of authentication requirements mean that attackers can operate anonymously and at scale, potentially causing significant economic damage and reputational harm to affected organizations across Europe.
Mitigation Recommendations
Immediate mitigation should focus on replacing or upgrading the insecure MiFare Classic NFC cards with more secure alternatives that implement strong cryptographic protections, such as MiFare DESFire EV2 or EV3 cards. Organizations should work closely with KioSoft to obtain firmware or hardware updates that address the insecure storage issue. Until patches or replacements are available, deploying additional security controls is advisable, such as limiting the acceptance of stored value cards to those verified through backend validation mechanisms rather than relying solely on card-stored balances. Implementing transaction monitoring to detect anomalous spending patterns can help identify fraudulent activity early. Physical security measures to restrict unauthorized NFC access to unattended payment terminals should be enhanced. Finally, educating staff and users about the risks and encouraging prompt reporting of suspicious card behavior will aid in early detection and response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-08-07T11:34:02.115Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c403142c3fd21ea9204bc0
Added to database: 9/12/2025, 11:25:08 AM
Last enriched: 9/19/2025, 3:47:55 PM
Last updated: 10/30/2025, 12:13:08 PM
Views: 105
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10317: CWE-352 Cross-Site Request Forgery (CSRF) in OpenSolution Quick.Cart
MediumCVE-2025-39663: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in Checkmk GmbH Checkmk
HighCVE-2025-53883: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in SUSE Container suse manager 5.0
CriticalCVE-2025-53880: CWE-35: Path Traversal in SUSE Container suse/manager/4.3/proxy-httpd:latest
HighCVE-2025-54941: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Apache Software Foundation Apache Airflow
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.