Supply chain β›“ Supply Chain

Fiserv Event Manager vulnerability exposes customer data at hundreds of banks (August 2018)

πŸ“… 2018-08-01 🏒 Fiserv Event Manager
Primary Source β†—

Incident Details

In August 2018, KrebsOnSecurity reported a significant security flaw in Fiserv’s web banking platform that exposed personal and financial details of customers at hundreds of community banks and credit unions across the United States. Fiserv is the dominant core banking technology provider for small financial institutions, holding more than 37 percent of the market and powering the web portals for thousands of banks.

The vulnerability existed in a component called Event Manager, a messaging feature integrated into Fiserv’s core banking systems that sends one-way transactional alerts to customers β€” such as notifications about low balances or large withdrawals. Security researcher Kristian Erik Hermansen discovered that the feature contained a classic insecure direct object reference (IDOR) flaw: by simply modifying a numeric identifier in the URL of a bank’s customer-facing web page, an authenticated user could view another customer’s previously received alert messages. Those alerts contained email addresses, phone numbers, and partial bank account numbers.

Brian Krebs independently verified Hermansen’s findings, replicating the exposure across multiple Fiserv-powered bank websites. Because Fiserv provides a hosted, shared platform to hundreds of institutions, the single underlying code vulnerability simultaneously affected a large swath of the US community banking sector.

Fiserv was notified and developed a security patch within 24 hours. The patch was deployed to all clients using the hosted version of the solution. In a statement, Fiserv said it addressed the issue and was not aware of any actual fraud that resulted from the vulnerability.

The precise number of customer records exposed was never publicly quantified, but given Fiserv’s market position serving hundreds of community banks with millions of retail customers, the potential exposure was substantial. The incident underscored the systemic concentration risk created when a single fintech provider becomes the shared infrastructure for a large fraction of an industry β€” a vulnerability in one vendor can cascade across hundreds of nominally independent institutions simultaneously.

Technical Details

Initial Attack Vector
Insecure direct object reference (IDOR) vulnerability in Fiserv's Event Manager messaging platform β€” editing a single digit in a bank website URL parameter allowed any authenticated user to view other customers' account alert data, including email addresses, phone numbers, and partial account numbers
Vendor / Product
Fiserv Event Manager
Supply Chain Attack
βœ… Confirmed third-party / vendor compromise

Timeline

  1. 2018-08-01 Breach occurred
  2. 2018-08-28 Publicly disclosed