Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8699: CWE-922 Insecure Storage of Sensitive Information in KioSoft Stored Value Unattended Payment Solution

0
Critical
VulnerabilityCVE-2025-8699cvecve-2025-8699cwe-922
Published: Fri Sep 12 2025 (09/12/2025, 11:19:44 UTC)
Source: CVE Database V5
Vendor/Project: KioSoft
Product: Stored Value Unattended Payment Solution

Description

Some "Stored Value" Unattended Payment Solutions of KioSoft use vulnerable NFC cards. Attackers could potentially use this vulnerability to change the balance on the cards and generate money. The account balance is stored on an insecure MiFare Classic NFC card and can be read and written back. By carefully observing changes in card dumps, one can identify fields that store the cash value of the card. Additionally, a checksum can be identified, which is created by XOR-ing the cash and an unknown field with a certain value. By updating the fields accordingly, arbitrary amounts of money can be loaded onto the card (up to $655,35) to pay for goods.

AI-Powered Analysis

AILast updated: 11/03/2025, 20:39:48 UTC

Technical Analysis

CVE-2025-8699 identifies a critical security vulnerability in KioSoft's Stored Value Unattended Payment Solution, which relies on MiFare Classic NFC cards to store monetary balances. These cards are inherently insecure due to weak cryptographic protections and allow both reading and writing of stored data without proper authentication. Attackers can analyze multiple card dumps to identify the specific data fields representing the cash balance and the associated checksum, which is computed by XOR-ing the cash value with an unknown field and a constant. By manipulating these fields and recalculating the checksum accordingly, an attacker can arbitrarily increase the stored balance on the card, effectively generating counterfeit funds up to $65,535. This attack requires no privileges, no user interaction, and can be performed remotely if physical access to the card is obtained. The vulnerability stems from CWE-922, which concerns insecure storage of sensitive information, exposing the system to integrity and confidentiality breaches. Despite the high CVSS score of 9.1 (AV:N/AC:L/PR:N/UI:N), no patches or firmware updates are currently available, and no exploits have been reported in the wild. The solution's reliance on insecure NFC technology without backend verification or cryptographic safeguards makes it susceptible to fraud and financial abuse.

Potential Impact

For European organizations deploying KioSoft's Stored Value Unattended Payment Solution, this vulnerability poses a significant risk of financial fraud and revenue loss due to the ability of attackers to inflate card balances arbitrarily. The integrity of payment transactions is compromised, undermining trust in unattended payment systems. Confidentiality of stored payment data is also at risk, potentially exposing sensitive financial information. The availability of the payment system is not directly affected; however, the financial and reputational damage could lead to operational disruptions and increased scrutiny from regulators. Retailers, transit operators, and other service providers using these NFC-based payment solutions may face increased fraud losses and customer dissatisfaction. Additionally, the lack of patches means organizations must rely on compensating controls, increasing operational complexity and costs. Regulatory compliance risks may arise under GDPR and payment security standards if sensitive financial data is inadequately protected.

Mitigation Recommendations

Immediate mitigation should focus on replacing MiFare Classic NFC cards with secure alternatives that implement strong cryptographic protections, such as MiFare DESFire EV2 or EV3 cards, which support mutual authentication and encrypted data storage. Organizations should implement backend validation of card balances and transaction logs to detect and prevent fraudulent balance manipulations. Deploying tamper-evident hardware and secure key management practices is critical. Where replacement is not immediately feasible, monitoring transaction anomalies and setting transaction limits can reduce fraud impact. Firmware and software updates should be prioritized once available from KioSoft. Additionally, organizations should conduct security audits of unattended payment systems and train staff to recognize and respond to potential fraud attempts. Collaboration with payment security experts and adherence to PCI DSS guidelines for stored value systems will further enhance defenses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
SEC-VLab
Date Reserved
2025-08-07T11:34:02.115Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68c403142c3fd21ea9204bc0

Added to database: 9/12/2025, 11:25:08 AM

Last enriched: 11/3/2025, 8:39:48 PM

Last updated: 12/15/2025, 2:02:20 AM

Views: 232

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats