The Information Highway

The Information Highway

Font size: +
3 minutes reading time (507 words)

Check-in terminals used by thousands of hotels leak guest info

Ariane Systems self check-in systems installed at thousands of hotels worldwide are vulnerable to a kiosk mode bypass flaw that could allow access to guests' personal information and the keys for other rooms.

These terminals allow people to book and check into the hotel themselves, handle the payment process via a POS subsystem, print invoices, and provision RFID transponders used as room keys.

Back in March, Pentagrid security researcher Martin Schobert discovered that he could easily bypass the Ariane Allegro Scenario Player running in kiosk mode on the self check-in terminal at the hotel he was staying, and access the underlying Windows desktop with all customer details. 

Despite multiple attempts to alert the vendor, the researcher has yet to receive a proper response from the vendor about the firmware version that addresses the issue.

Single quote escape

 Schobert discovered that the application hangs when entering a single quote on the reservations look-up screen of the terminal.

When touching the screen again, the underlying Windows operating system offers the user the option to end the app's process, which terminates the Ariane Allegro Scenario Player and gives access to the desktop.

From there, the user may access any files stored on the device, which could include anything from reservation entries with personally identifiable information (PII) to invoices.

Entering a single quote on the search screen
Source: Pentagrid

"With access to the Windows desktop, attacks on the hotel network could become possible as well as access to data stored on the terminal, which includes PII, reservations, and invoices," explains the Pentagrid report.

"With the ability to inject and execute program code, it seems possible to get room keys created for other rooms because the functionality of provisioning RFID transponders is implemented in the terminal."

Impact and fixing

The vulnerable terminals are typically used in small to medium-sized establishments where employing check-in staff 24/7 would be to costly for the business.

According to Ariane Systems, its self-checkout solutions are currently used by 3,000 hotels in 25 countries, which collectively have over 500,000 rooms. Among their clients are one-third of the world's top 100 hotel chains.

Schobert attempted multiple times to communicate his findings to Ariane since discovering the issue in early March but he only got a short response claiming that the issues had been fixed.

Currently, it is unknown which version of the application fixes the problem, how many terminals are using a vulnerable version, and which hotel chains are impacted.

Hotel operators using Ariane Systems terminals are recommended to isolate the self check-in machines from the hotel network and other critical systems and contact the vendor to determine if they are running a secure version.

In April, Schobert discovered a similar issue at a self check-in terminal used by a German Ibis hotel. He found that an input of six consecutive dashes for the booking reference number would cause the terminal to return booking details such as price, room number, and valid entry keycodes.

Advance Auto Parts stolen data for sale after Snow...
Cybersecurity Threat Advisory: New ShrinkLocker ra...

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Thursday, 19 December 2024

Captcha Image

Top Breaches Of 2023

Customers Affected In T-Mobile Breach
Accounts Affected In MOVEit Breach
Customers Affected In MCNA Insurance Data Breach
Individuals Affected In PharMerica Data Breach
Users Affected In ChatGPT Major Data Breach
*Founder Shield End of Year 2023