Trending

HomeBlog
Toll Plaza Data Exposure
Cyble-Misconfigured-Server-Exposes-Toll-Booth-Transaction-Data

Toll Plaza Data Exposure

Cyble's Research on misconfigured servers that could risk exposing FASTag toll booth data.

FASTag is a toll collection system in India based on Radio Frequency Identification (RFID) technology. FASTag directly makes payments from the bank account to the toll plaza without stopping for transactions.

Cyble Research Labs found a publicly exposed website containing plain text data of an unidentified toll plaza. The exposed website has information related to transactions, vehicle registration, vehicle type, tag ID, digital signature, etc., used for transactions.

Figure 1 shows the website containing the configuration data of the website.

Cyble-Toll-Plaza-Leak-1
Figure 1: The website containing the configuration data of the website

The folder XmlFiles contains data related to the various transections starting from 27 August 2021 till 27 December 2021, as shown in Figure 2.

Cyble-Toll-Plaza-Leak
Figure 2: The various transections

We found that the folder contains XML files containing data related to FASTag transactions during our analysis.

The following information is present in the XML files:

report-ad-banner
  • Plaza ID
  • Vehicle Tag ID
  • Vehicle Class
  • Vehicle Registration Number
  • Digital Signature Information

The XML file containing further details is shown in Figure 3.

 Cyble-Toll-Plaza-Leak
Figure 3: The further details from the leak

Conclusion

This data exposure poses third-party risks. Though the risk level is relatively low, attackers could potentially leverage the exposed data to carry out social engineering attacks.

Our Recommendations

Following essential cybersecurity best practices creates the first line of control against attackers. We recommend that our readers follow the best practices given below:

  • Regularly monitor your public-facing network assets.
  • External APIs should implement authentication measures to keep critical data confidential.
  • Regularly perform audits and Vulnerability Assessment and Penetration Testing (VAPT) of organizational assets, including network and software.
  • Implement strict Identity and Access Management (IAM) policy.

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading