CVE-2023-28725
Severity CVSS v4.0:
Pending analysis
Type:
CWE-434
Unrestricted Upload of File with Dangerous Type
Publication date:
22/03/2023
Last modified:
26/02/2025
Description
General Bytes Crypto Application Server (CAS) 20230120, as distributed with General Bytes BATM devices, allows remote attackers to execute arbitrary Java code by uploading a Java application to the /batm/app/admin/standalone/deployments directory, aka BATM-4780, as exploited in the wild in March 2023. This is fixed in 20221118.48 and 20230120.44.
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:generalbytes:crypto_application_server:20230120:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://arstechnica.com/information-technology/2023/03/hackers-drain-bitcoin-atms-of-1-5-million-by-exploiting-0-day-bug/
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS
- https://twitter.com/generalbytes/status/1637192687160897537
- https://web3isgoinggreat.com/single/general-bytes-crypto-atms-exploited-for-over-1-6-million
- https://www.bleepingcomputer.com/news/security/general-bytes-bitcoin-atms-hacked-using-zero-day-15m-stolen/
- https://www.generalbytes.com/en/support/changelog
- https://arstechnica.com/information-technology/2023/03/hackers-drain-bitcoin-atms-of-1-5-million-by-exploiting-0-day-bug/
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/2885222430/Security+Incident+March+17-18th+2023
- https://generalbytes.atlassian.net/wiki/spaces/ESD/pages/951418958/Update+CAS
- https://twitter.com/generalbytes/status/1637192687160897537
- https://web3isgoinggreat.com/single/general-bytes-crypto-atms-exploited-for-over-1-6-million
- https://www.bleepingcomputer.com/news/security/general-bytes-bitcoin-atms-hacked-using-zero-day-15m-stolen/
- https://www.generalbytes.com/en/support/changelog



