A security researcher reverse engineered a Worldline Yomani XR payment terminal and discovered an exposed root shell accessible via serial console without authentication. Despite sophisticated tamper detection mechanisms using pressure-sensitive connectors and copper traces, the debug interface remained accessible through an external hatch. The researcher extracted unencrypted firmware using chip-off techniques, revealing an outdated Linux system (kernel 3.6 from 2023). However, the security impact is limited because the Linux system only handles networking and updates, while sensitive payment operations run on a separate, encrypted secure processor.

10m read timeFrom stefan-gloor.ch
Post cover image
Table of contents
First LookTamper ProtectionsChip-Off Firmware ExtractionFinding a Root Shell on AccidentIs This as Bad as It Looks?Disclosure TimelineConclusion
3 Comments

Sort: