CVE-2025-8699: CWE-922 Insecure Storage of Sensitive Information in KioSoft Stored Value Unattended Payment Solution
Some "Stored Value" Unattended Payment Solutions of KioSoft use vulnerable NFC cards. Attackers could potentially use this vulnerability to change the balance on the cards and generate money. The account balance is stored on an insecure MiFare Classic NFC card and can be read and written back. By carefully observing changes in card dumps, one can identify fields that store the cash value of the card. Additionally, a checksum can be identified, which is created by XOR-ing the cash and an unknown field with a certain value. By updating the fields accordingly, arbitrary amounts of money can be loaded onto the card (up to $655,35) to pay for goods.
AI Analysis
Technical Summary
CVE-2025-8699 identifies a critical security vulnerability in KioSoft's Stored Value Unattended Payment Solution, which relies on MiFare Classic NFC cards to store monetary balances. These cards are inherently insecure due to weak cryptographic protections and allow both reading and writing of stored data without proper authentication. Attackers can analyze multiple card dumps to identify the specific data fields representing the cash balance and the associated checksum, which is computed by XOR-ing the cash value with an unknown field and a constant. By manipulating these fields and recalculating the checksum accordingly, an attacker can arbitrarily increase the stored balance on the card, effectively generating counterfeit funds up to $65,535. This attack requires no privileges, no user interaction, and can be performed remotely if physical access to the card is obtained. The vulnerability stems from CWE-922, which concerns insecure storage of sensitive information, exposing the system to integrity and confidentiality breaches. Despite the high CVSS score of 9.1 (AV:N/AC:L/PR:N/UI:N), no patches or firmware updates are currently available, and no exploits have been reported in the wild. The solution's reliance on insecure NFC technology without backend verification or cryptographic safeguards makes it susceptible to fraud and financial abuse.
Potential Impact
For European organizations deploying KioSoft's Stored Value Unattended Payment Solution, this vulnerability poses a significant risk of financial fraud and revenue loss due to the ability of attackers to inflate card balances arbitrarily. The integrity of payment transactions is compromised, undermining trust in unattended payment systems. Confidentiality of stored payment data is also at risk, potentially exposing sensitive financial information. The availability of the payment system is not directly affected; however, the financial and reputational damage could lead to operational disruptions and increased scrutiny from regulators. Retailers, transit operators, and other service providers using these NFC-based payment solutions may face increased fraud losses and customer dissatisfaction. Additionally, the lack of patches means organizations must rely on compensating controls, increasing operational complexity and costs. Regulatory compliance risks may arise under GDPR and payment security standards if sensitive financial data is inadequately protected.
Mitigation Recommendations
Immediate mitigation should focus on replacing MiFare Classic NFC cards with secure alternatives that implement strong cryptographic protections, such as MiFare DESFire EV2 or EV3 cards, which support mutual authentication and encrypted data storage. Organizations should implement backend validation of card balances and transaction logs to detect and prevent fraudulent balance manipulations. Deploying tamper-evident hardware and secure key management practices is critical. Where replacement is not immediately feasible, monitoring transaction anomalies and setting transaction limits can reduce fraud impact. Firmware and software updates should be prioritized once available from KioSoft. Additionally, organizations should conduct security audits of unattended payment systems and train staff to recognize and respond to potential fraud attempts. Collaboration with payment security experts and adherence to PCI DSS guidelines for stored value systems will further enhance defenses.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-8699: CWE-922 Insecure Storage of Sensitive Information in KioSoft Stored Value Unattended Payment Solution
Description
Some "Stored Value" Unattended Payment Solutions of KioSoft use vulnerable NFC cards. Attackers could potentially use this vulnerability to change the balance on the cards and generate money. The account balance is stored on an insecure MiFare Classic NFC card and can be read and written back. By carefully observing changes in card dumps, one can identify fields that store the cash value of the card. Additionally, a checksum can be identified, which is created by XOR-ing the cash and an unknown field with a certain value. By updating the fields accordingly, arbitrary amounts of money can be loaded onto the card (up to $655,35) to pay for goods.
AI-Powered Analysis
Technical Analysis
CVE-2025-8699 identifies a critical security vulnerability in KioSoft's Stored Value Unattended Payment Solution, which relies on MiFare Classic NFC cards to store monetary balances. These cards are inherently insecure due to weak cryptographic protections and allow both reading and writing of stored data without proper authentication. Attackers can analyze multiple card dumps to identify the specific data fields representing the cash balance and the associated checksum, which is computed by XOR-ing the cash value with an unknown field and a constant. By manipulating these fields and recalculating the checksum accordingly, an attacker can arbitrarily increase the stored balance on the card, effectively generating counterfeit funds up to $65,535. This attack requires no privileges, no user interaction, and can be performed remotely if physical access to the card is obtained. The vulnerability stems from CWE-922, which concerns insecure storage of sensitive information, exposing the system to integrity and confidentiality breaches. Despite the high CVSS score of 9.1 (AV:N/AC:L/PR:N/UI:N), no patches or firmware updates are currently available, and no exploits have been reported in the wild. The solution's reliance on insecure NFC technology without backend verification or cryptographic safeguards makes it susceptible to fraud and financial abuse.
Potential Impact
For European organizations deploying KioSoft's Stored Value Unattended Payment Solution, this vulnerability poses a significant risk of financial fraud and revenue loss due to the ability of attackers to inflate card balances arbitrarily. The integrity of payment transactions is compromised, undermining trust in unattended payment systems. Confidentiality of stored payment data is also at risk, potentially exposing sensitive financial information. The availability of the payment system is not directly affected; however, the financial and reputational damage could lead to operational disruptions and increased scrutiny from regulators. Retailers, transit operators, and other service providers using these NFC-based payment solutions may face increased fraud losses and customer dissatisfaction. Additionally, the lack of patches means organizations must rely on compensating controls, increasing operational complexity and costs. Regulatory compliance risks may arise under GDPR and payment security standards if sensitive financial data is inadequately protected.
Mitigation Recommendations
Immediate mitigation should focus on replacing MiFare Classic NFC cards with secure alternatives that implement strong cryptographic protections, such as MiFare DESFire EV2 or EV3 cards, which support mutual authentication and encrypted data storage. Organizations should implement backend validation of card balances and transaction logs to detect and prevent fraudulent balance manipulations. Deploying tamper-evident hardware and secure key management practices is critical. Where replacement is not immediately feasible, monitoring transaction anomalies and setting transaction limits can reduce fraud impact. Firmware and software updates should be prioritized once available from KioSoft. Additionally, organizations should conduct security audits of unattended payment systems and train staff to recognize and respond to potential fraud attempts. Collaboration with payment security experts and adherence to PCI DSS guidelines for stored value systems will further enhance defenses.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2025-08-07T11:34:02.115Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68c403142c3fd21ea9204bc0
Added to database: 9/12/2025, 11:25:08 AM
Last enriched: 11/3/2025, 8:39:48 PM
Last updated: 12/15/2025, 2:02:20 AM
Views: 232
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14695: Dynamically-Managed Code Resources in SamuNatsu HaloBot
MediumCVE-2025-14694: SQL Injection in ketr JEPaaS
MediumCVE-2025-14693: Symlink Following in Ugreen DH2100+
HighCVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync
MediumCVE-2025-14692: Open Redirect in Mayan EDMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.