CVE-2025-70616
Diebold Nixdorf · wnBios64
A stack buffer overflow vulnerability in the Diebold Nixdorf (Wincor Nixdorf) wnBios64 component could allow for arbitrary code execution at the firmware level.
Executive summary
Diebold Nixdorf wnBios64 contains a high-severity stack buffer overflow that could allow an attacker to execute malicious code with high privileges, potentially compromising the entire system.
Vulnerability
A stack buffer overflow exists in the wnBios64 BIOS component. This type of vulnerability typically requires local or administrative access to the operating system to trigger the overflow in the firmware interface, allowing for code execution in a highly privileged environment.
Business impact
A successful exploit at the BIOS level is catastrophic, as it allows attackers to bypass operating system security controls and establish persistence that survives OS reinstallation. The CVSS score of 7.8 reflects the severity of this hardware-level risk, which could lead to the total compromise of ATMs or point-of-sale systems, resulting in significant financial fraud and system downtime.
Remediation
Immediate Action: Deploy the latest BIOS/firmware updates provided by Diebold Nixdorf to all affected hardware assets immediately.
Proactive Monitoring: Monitor for unauthorized firmware modification attempts or unusual system behavior during the boot process.
Compensating Controls: Ensure Secure Boot is enabled and implement strict physical security and OS-level hardening to prevent unauthorized users from accessing BIOS-related utilities.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability represents a significant threat to the underlying trust of the hardware platform. It is imperative that organizations using Diebold Nixdorf systems identify affected hardware and apply firmware patches immediately to prevent deep-level system compromise.