SEC Consult SA-20251029-0 :: Unprotected NFC card manipulation leading to free top-up in GiroWeb Cashless Catering Solutions (only legacy customer infrastructure)
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我需要仔细阅读这篇文章,理解它的主要内容。 这篇文章看起来是一个安全漏洞的公告。标题是“Unprotected NFC card manipulation leading to free top-up”,也就是未受保护的NFC卡操作导致免费充值。产品是GiroWeb Cashless Catering Solutions,也就是无现金餐饮解决方案。影响版本是使用过时的Legic Prime或其他不安全NFC卡的旧客户基础设施。 漏洞的影响被评估为“critical”,也就是关键级别的。发现者是Steffen Robertz和Christian Hager,属于SEC Consult Vulnerability Lab。漏洞描述中提到,账户余额存储在不安全的NFC卡上,可以被读取和写入,从而 manipulating the right field来创建虚拟资金,用于购买商品或转回攻击者的银行账户。 证明概念部分提到使用Proxmark设备读取和修改卡片数据,并提供了一个Python脚本来演示如何修改余额。解决方法是建议客户更新到安全的卡片,并联系GiroWeb寻求解决方案。 总结一下,文章主要讲述了GiroWeb的一个关键安全漏洞,涉及旧版NFC卡的不安全存储导致资金被篡改的问题。 </think> 文章指出GiroWeb无现金餐饮解决方案中使用过时NFC卡存在严重漏洞:攻击者可利用该漏洞通过篡改卡片余额实现免费充值或资金转移。该问题源于卡片数据未受充分保护且余额存储在卡片本地。建议受影响用户升级至安全卡片并联系厂商解决此隐患。 2025-10-30 01:6:17 Author: seclists.org(查看原文) 阅读量:12 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: SEC Consult Vulnerability Lab via Fulldisclosure <fulldisclosure () seclists org>
Date: Wed, 29 Oct 2025 07:33:15 +0000

SEC Consult Vulnerability Lab Security Advisory < 20251029-0 >
=======================================================================
              title: Unprotected NFC card manipulation leading to free top-up
            product: GiroWeb Cashless Catering Solutions
 vulnerable version: Only legacy customer infrastructure using outdated
                     Legic Prime or other insecure NFC cards
      fixed version: -
         CVE number: -
             impact: critical
    vendor homepage: https://giro-web.com/zahlungssysteme/
              found: 2022-12-20
                 by: Steffen Robertz
                     Christian Hager (Office Vienna)
                     SEC Consult Vulnerability Lab

                     An integrated part of SEC Consult, an Eviden business
                     Europe | Asia

                     https://www.sec-consult.com

=======================================================================

Vendor description:
-------------------
(German) "GiroWeb ist ein Verbund aus 6 IT-Systemhäusern mit dem Fokus auf
Entwicklung, Installation und Betreuung von digitalen Kassen- und Zahlungssystemen.
Dazu zählen z.B. Online-Bestellsysteme, Smartphone-Apps, Aufwerter und
RFID-Kartenleser. Die GiroWeb Gruppe betreut deutschlandweit Projekte in den
Marktsegmenten Business-Catering und Education-Catering. Seit 30 Jahren liefern
wir unseren Kunden professionelle Lösungen und Dienstleistungen vor Ort."

Source: https://giro-web.com/giroweb-team/


Business recommendation:
------------------------
The vendor did not respond to our communication attempts and only communicated
with German BSI CERT-Bund, see timeline below. Hence, we are unaware of the
exact affected legacy solutions.

The vendor explicitly mentioned to CERT-Bund that they only use the existing
hardware of their customers and therefore those customers are responsible for
issuing secure cards and that it is not a security issue in GiroWeb solutions.

SEC Consult attempted to inform the vendor via CERT-Bund that this vulnerability
could potentially be resolved directly in GiroWeb. To do this, the account balance
would have to be stored directly in a database and validated when a withdrawal
is made. However, as direct communication was not possible, SEC Consult did not
receive a response and can therefore only assume that the problem is due to
outdated cards being used at legacy customer infrastructure.

In case of affected end users / customers, we urge them to update their
infrastructure to use secure cards and contact GiroWeb directly to work
on a solution to mitigate the known security issue of using vulnerable cards.

SEC Consult highly recommends to perform a thorough security review of the
product conducted by security professionals to identify and resolve potential
further security issues.


Vulnerability overview/description:
-----------------------------------
1) Unprotected NFC card manipulation leading to free top-up
The account balance is stored on an insecure NFC card. This means the card
can be read and written back. By manipulating the right field, one can
"create money out of thin air" and use it to pay for goods, or transfer
the fake sum back to the attacker's bank account.


Proof of concept:
-----------------
1) Unprotected NFC card manipulation leading to free top-up
GiroPay offers the usage of different card types. The tested solution was based
on Legic Prime NFC tags. Thus, all contents can be read if one owns the correct
hardware (e.g. a Proxmark device). By carefully observing changes in card dumps,
one can identify fields that store the cash value of the card.

Legic Prime tags use obfuscation to hide the cards data. In order to extract
the cleartext data, one has to XOR each byte of the dump with the CRC of the
UID (4th byte of dump). Afterwards, the Giroweb structure has to be identified in
the dump. This is done by calculating the CRC8-Mifare-MAD checksum over all
possible Giroweb structures. Only one should calculate a correct CRC. The stored
credit amount is a two byte value stored at the struct offset 5. The amount is
stored in cents. Thus, the most that the card can be charged up to is 655.35€.

After modifying this value, the checksum of the Giroweb struct has to be
recalculated. The data can then be written back to the tag and used to pay for
goods or to charge the credit back to a bank account.

The following Python script was developed to modify the data. It requires a dump
file created with `pm3 -c "hf legic dump"`. This will generate a .bin file
containing the obfuscated card data. Then call the script with e.g.:
`python giroweb_cash_mod.py -i hf-legic-DEADBEEF-dump.bin -d -m 1337 -o hf-legic-DEADBEEF-more-money.bin`

The output file can then be rewritten to the card with
`pm3 -c "hf legic restore -f hf-legic-DEADBEEF-more-money.bin"`.

giroweb_cash_mod.py Python script:
---------------------------------------
<PoC removed>
---------------------------------------


Vulnerable / tested versions:
-----------------------------
According to GiroWeb, some of their customers are still using outdated /
insecure cards and are therefore vulnerable. Exact versions or the
infrastructure in use are unknown.


Vendor contact timeline:
------------------------
Initially, those issues were already found late 2022 and verified again in 2023.
Our customer wanted to do the coordination internally, but communication was slow
hence we are proceeding with the CVD process again in 2025.

2025-02-04: Contacting vendor through support-nord () giro-web com; No response.
2025-02-19: Contacting vendor through support-nord () giro-web com and info-nord () giro-web com;
            No response
2025-03-03: Asking for an update; no response
2025-03-18: Asking for an update; no response
2025-03-25: Escalating to BSI/CERT-Bund
2025-03-27: CERT-Bund, they won't handle the CVD, because the LEGIC prime tags are
            already known as insecure. They will submit the details to the vendor.
2025-03-28: Explaining to CERT-Bund that it might be possible to cash out ~600 Euro
            daily through this attack and that fraud detection should be implemented
            in case it isn't. Asking for a contact at GiroWeb to discuss further details.
2025-04-16: CERT-Bund has established contact with the vendor.
2025-04-30: CERT-Bund answers that GiroWeb does not want to establish a direct contact
            with us. They submitted further details of our advisory to the vendor and
            our intentions to publish it.
2025-05-19: Asking if there is further information from the vendor, otherwise we would
            plan to release our advisory.
2025-06-10: Asking for a status update.
2025-06-16: CERT-Bund responds that the vendor has sent the details to their development
            team. The vendor also requested a meeting with CERT-Bund to discuss the
            vulnerability and potential mitigation. Requested postponement of advisory.
2025-07-23: CERT-Bund informs us that GiroWeb does not issue cards themselves but uses
            the infrastructure of their customers (company access IDs, etc). GiroWeb
            recommends using secure cards. CERT-Bund tells us that the end users are
            responsible for security and not GiroWeb according to the vendor.
2025-09-08: Thanking CERT-Bund for the coordination. Also we recommend that GiroWeb
            acts proactively, informing all their customers using insecure cards about the
            issue as money could be potentially stolen (cashed out). Asking again if it
            is possible to establish a contact with GiroWeb to explain the details and
            include correct information in our advisory about affected solutions.
            No response.
2025-10-13: Informing CERT-Bund that we plan to release our security advisory on
            29th October.
2025-10-16: Response from CERT-Bund who clarify that GiroWeb generally uses secure cards,
            but some customers still have outdated and vulnerable cards in place (legacy
            support) which will be replaced in the future. GiroWeb strongly recommends
            their customers to use secure cards through multiple channels.
2025-10-29: Public release of advisory.


Solution:
---------
The vendor did not respond to our communication attempts and only communicated
with German BSI CERT-Bund, see timeline above. Hence, we are unaware of the
exact affected legacy solutions.

The vendor explicitly mentioned to CERT-Bund that they only use the existing
hardware of their customers and therefore those customers are responsible for
issuing secure cards and that it is not a security issue in GiroWeb solutions.

SEC Consult attempted to inform the vendor via CERT-Bund that this vulnerability
could potentially be resolved directly in GiroWeb. To do this, the account balance
would have to be stored directly in a database and validated when a withdrawal
is made. However, as direct communication was not possible, SEC Consult did not
receive a response and can therefore only assume that the problem is due to
outdated cards being used at legacy customer infrastructure.

In case of affected end users / customers, we urge them to update their
infrastructure to use secure cards and contact GiroWeb directly to work
on a solution to mitigate the known security issue of using vulnerable cards.


Workaround:
-----------
Only store GiroWeb structure on secure cards (e.g. MiFare DESfire).


Advisory URL:
-------------
https://sec-consult.com/vulnerability-lab/


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SEC Consult Vulnerability Lab
An integrated part of SEC Consult, an Eviden business
Europe | Asia

About SEC Consult Vulnerability Lab
The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an
Eviden business. It ensures the continued knowledge gain of SEC Consult in the
field of network and application security to stay ahead of the attacker. The
SEC Consult Vulnerability Lab supports high-quality penetration testing and
the evaluation of new offensive and defensive technologies for our customers.
Hence our customers obtain the most current information about vulnerabilities
and valid recommendation about the risk profile of new technologies.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Interested to work with the experts of SEC Consult?
Send us your application https://sec-consult.com/career/

Interested in improving your cyber security with the experts of SEC Consult?
Contact our local offices https://sec-consult.com/contact/
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Mail: security-research at sec-consult dot com
Web: https://www.sec-consult.com
Blog: https://blog.sec-consult.com
X: https://x.com/sec_consult

EOF S.Robertz, C. Hager / @2025

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Current thread:

  • SEC Consult SA-20251029-0 :: Unprotected NFC card manipulation leading to free top-up in GiroWeb Cashless Catering Solutions (only legacy customer infrastructure) SEC Consult Vulnerability Lab via Fulldisclosure (Oct 29)

文章来源: https://seclists.org/fulldisclosure/2025/Oct/32
如有侵权请联系:admin#unsafe.sh