🛡
HighMarch 24, 2026

Triple Threat: CVE-2026-4582/4583/4584 — mPOS Payment Terminal Bluetooth Vulnerabilities Expose Cardholder Data

Three newly published CVEs (CVE-2026-4582, CVE-2026-4583, CVE-2026-4584) affecting the Shenzhen HCC Technology MPOS M6 PLUS payment terminal reveal critical gaps in Bluetooth authentication and cleartext cardholder data handling. Though individually rated low-to-medium severity, the combined attack chain poses real fraud risk in retail and hospitality environments.

RetailFinancial ServicesHospitalityPayment ProcessingEvents & Ticketing
📈

Executive Summary

Published on March 23, 2026, three linked CVEs target the MPOS M6 PLUS (firmware 1V.31-N), a widely deployed mobile point-of-sale terminal used in retail, hospitality, and pop-up merchant environments. CVE-2026-4582 exposes missing Bluetooth authentication, CVE-2026-4583 enables authentication bypass via capture-replay, and CVE-2026-4584 reveals cardholder data transmitted in cleartext — a trifecta that enables a local attacker to intercept, replay, and steal payment data without device credentials. Despite CVSS scores that individually sit in the low-to-medium range, the chained exploitation path is alarming for PCI DSS compliance teams. An attacker within Bluetooth range of a transaction can capture authentication tokens (CVE-2026-4583), bypass the device's security handshake (CVE-2026-4582), and then harvest cleartext cardholder data flowing through the device (CVE-2026-4584). A proof-of-concept exploit has been published to GitHub by the original reporter (handle: davimo). Shenzhen HCC Technology has not responded to responsible disclosure and no patches are available. Security teams managing payment terminal fleets, particularly in environments with open public access (pop-up retail, food service, event venues), should treat this as a high-priority risk. The absence of vendor response and the availability of a PoC escalates urgency significantly beyond raw CVSS scores.

Key Findings
  • Published on March 23, 2026, three linked CVEs target the MPOS M6 PLUS (firmware 1V
  • 31-N), a widely deployed mobile point-of-sale terminal used in retail, hospitality, and pop-up merchant environments
  • CVE-2026-4582 exposes missing Bluetooth authentication, CVE-2026-4583 enables authentication bypass via capture-replay, and CVE-2026-4584 reveals cardholder data transmitted in cleartext — a trifecta that enables a local attacker to intercept, replay, and steal payment data without device credentials
  • Despite CVSS scores that individually sit in the low-to-medium range, the chained exploitation path is alarming for PCI DSS compliance teams

Overview

Three coordinated CVEs affecting the Shenzhen HCC Technology MPOS M6 PLUS mobile payment terminal (firmware version 1V.31-N) were disclosed on March 23, 2026. Published via VulDB and assigned by the CVE Program, the trio targets the device's Bluetooth subsystem and cardholder data handling pipeline. Together, they constitute a practical attack chain against point-of-sale infrastructure in retail, food service, and event environments.

  • CVE-2026-4582 — Missing Authentication (CWE-306, CWE-287) in the Bluetooth component. CVSS 3.1: 5.0 (Medium). Allows unauthenticated access to device Bluetooth functions from the local network.
  • CVE-2026-4583 — Authentication Bypass by Capture-Replay (CWE-294) in the Bluetooth Handler. CVSS 4.0: 2.3 (Low). Allows attackers to replay captured Bluetooth auth tokens to bypass security checks.
  • CVE-2026-4584 — Cleartext Transmission of Sensitive Information (CWE-319) in the Cardholder Data Handler. Allows passive interception of payment card data in transit over Bluetooth.

Technical Analysis

The attack chain exploits a fundamental design weakness in how the M6 PLUS handles Bluetooth-based device authentication and data transmission:

  1. Phase 1 — Token Capture (CVE-2026-4583): An attacker within Bluetooth range passively sniffs Bluetooth communications during a legitimate session. The Bluetooth Handler does not implement replay protection (nonce-based or time-bound tokens), so captured authentication packets can be replayed indefinitely.
  2. Phase 2 — Auth Bypass (CVE-2026-4582): Even without a captured token, the Bluetooth component has code paths where authentication is entirely absent, allowing direct command injection into device functions from the local network.
  3. Phase 3 — Data Harvest (CVE-2026-4584): Once the attacker has established a Bluetooth session (either via replay or unauthenticated access), cardholder data flowing through the Cardholder Data Handler is transmitted in cleartext — primary account numbers (PAN), expiry dates, and potentially track data are exposed over the air.

A public proof-of-concept (PoC) exploit has been published to GitHub (github.com/Davim09/m6plusexploit), lowering the technical bar for exploitation. The attack requires local network/Bluetooth proximity but does not require special privileges or victim interaction. Complexity is rated high — but "high complexity" in CVSS means the attacker needs specific conditions, not advanced skills, and a crowded retail environment makes proximity trivial.

Impact Assessment

Directly Affected Sectors

  • Retail & Point-of-Sale: High risk — mPOS terminals are used at checkout, in-aisle, and for mobile transactions. Attacker can park near checkout or pose as a customer.
  • Food Service & Hospitality: High risk — tableside payment, food trucks, pop-up vendors using wireless terminals.
  • Events & Ticketing: High risk — crowded environments with many simultaneous Bluetooth-enabled payment terminals.
  • Financial Services / Acquiring Banks: Compliance exposure under PCI DSS 4.0, especially requirements 4.2 (encryption in transit) and 8.x (authentication controls).

PCI DSS Compliance Implications

CVE-2026-4584 (cleartext cardholder data) is a direct violation of PCI DSS Requirement 4.2.1, which mandates strong cryptography for cardholder data transmitted over open or public networks. Organizations deploying affected terminals face potential fines, audit findings, and liability in the event of a breach. QSAs (Qualified Security Assessors) should flag MPOS M6 PLUS firmware 1V.31-N as non-compliant pending vendor remediation.

Indicators of Compromise

Given the Bluetooth attack vector, traditional network-based IOCs are limited. Consider the following detection indicators:

  • Unexpected Bluetooth device pairing attempts on mPOS terminals
  • Bluetooth scanning activity (tools like hcitool, btlejuice, or Wireshark BT plugins) detected near terminal locations
  • Anomalous transaction patterns following proximity events (e.g., multiple declines then successes suggesting replay attempts)
  • Presence of devices running CVE PoC: github.com/Davim09/m6plusexploit

Recommendations

Immediate Actions (0–72 hours)

  • Inventory: Identify all deployed Shenzhen HCC Technology MPOS M6 PLUS units, specifically firmware version 1V.31-N.
  • Disable Bluetooth where possible: If Bluetooth connectivity is not required for your payment workflow, disable it at the device or network level.
  • Physical security: Enforce supervised access to payment terminal areas. Restrict customer proximity to active terminals.
  • Contact acquiring bank / payment processor: Notify them of potential compliance exposure and ask about terminal replacement or compensating controls.
  • Monitor transaction logs: Flag anomalous transaction patterns, especially repeated auth failures followed by success on the same terminal.

Medium-Term Actions (1–4 weeks)

  • Replace or retire affected terminals: As no vendor patch is available and vendor disclosure attempts went unanswered, plan for terminal replacement. Evaluate alternative mPOS vendors with stronger security track records and responsive disclosure processes.
  • PCI DSS assessment: Engage QSA for gap assessment if affected terminals are in scope for cardholder data environment (CDE).
  • Vendor escalation: Attempt direct contact with Shenzhen HCC Technology. If unresponsive, escalate to your acquiring bank and payment card brands (Visa, Mastercard) for formal notification.
  • Network segmentation: Ensure mPOS terminals are isolated on dedicated network segments with egress filtering.

Long-Term Considerations

  • Adopt a terminal procurement policy that requires vendors to maintain a published vulnerability disclosure program (VDP) and demonstrate patch responsiveness.
  • Favor payment terminals with end-to-end encryption (E2EE) and point-to-point encryption (P2PE) validated by PCI SSC.
  • Bluetooth-enabled payment devices should require mutual authentication with non-replayable tokens (e.g., ECDH key exchange per session).
RetailFinancial ServicesHospitalityPayment ProcessingEvents & Ticketing
CVE-2026-4582CVE-2026-4583CVE-2026-4584mPOSBluetoothauthentication bypasscardholder dataPCI DSSpayment terminalcapture-replay
📅March 24, 2026
🕒Mar 24, 2026
🔗3 sources

Related Briefs

Windows 11 Security Posture Analysis and Critical Remediation Requirements
HighMar 30, 2026

Windows 11 Security Posture Analysis and Critical Remediation Requirements

Critical analysis of Windows 11's current security architecture and essential improvements needed to enhance enterprise security posture. Assessment covers key vulnerabilities, recommended security controls, and strategic remediation priorities for enterprise environments.

🛡
HighMar 30, 2026

AI-Driven Social Engineering Attacks on Enterprise Employees

AI-powered social engineering attacks are increasingly targeting enterprise employees, leveraging advanced tactics to bypass security controls. These attacks can lead to significant financial losses and compromised sensitive data. This brief provides an overview of the threat landscape and recommendations for mitigation.

CRYPTO24 Ransomware Group Claims New Corporate Target ActionPower
HighMar 27, 2026

CRYPTO24 Ransomware Group Claims New Corporate Target ActionPower

Emerging ransomware group CRYPTO24 has claimed responsibility for a cyberattack against ActionPower, indicating potential data theft and system encryption. This development signals increased activity from the threat actor in the industrial sector.