Your Cannabis POS System is a Ticking Time Bomb

Your Cannabis POS System is a Ticking Time Bomb
Photo by FrabPOS Team / Unsplash

How dispensary point-of-sale misconfigurations lead to state audit failures, data breaches, and $50K+ penalties


Your cannabis point-of-sale system isn't just where you ring up customers.

It's where you store patient medical records (if you're a medical dispensary). It's connected to your state track-and-trace system (Metrc or BioTrack). It processes payment card data. It tracks your entire inventory in real-time.

And it's probably wide open to attackers.

Here's what we found after assessing 50+ cannabis dispensaries across 12 states:

  • 73% are running outdated POS software with known vulnerabilities
  • 62% use shared "budtender" accounts with no individual accountability
  • 54% have their POS on the same network as customer WiFi
  • 41% never changed default administrator credentials
  • 38% leave POS tablets unlocked and unattended in back offices

One misconfiguration = state audit failure = $17,500-$52,500 penalty.

Let's break down why your POS is a ticking time bomb—and what you can do about it.


The Problem: Your POS Wasn't Built for Cannabis Compliance

Cannabis-specific POS systems like Dutchie, Flowhub, and Treez are great at what they do: inventory management, customer tracking, state reporting integration.

But they were built by software startups, not security companies.

Here's what that means:

1. They Assume You'll Configure Security Properly

Out of the box, most cannabis POS systems have:

  • Generic admin credentials (admin / admin123)
  • No network segmentation requirements
  • Minimal access controls
  • Optional two-factor authentication
  • Default encryption settings

The problem: Most dispensaries install the POS, connect it to WiFi, and start selling. Security configuration never happens.

2. They're Connected to Everything

Modern cannabis POS systems integrate with:

  • State track-and-trace systems (Metrc, BioTrack, Leaf Data Systems)
  • Payment processors (Hypur, CanPay, Aeropay)
  • Banking platforms
  • Loyalty programs
  • E-commerce platforms
  • Delivery services
  • Inventory cameras
  • Employee time clocks

Each integration = another attack surface.

3. They Store Sensitive Data You Didn't Know About

Depending on your state and configuration, your POS might be storing:

  • Patient medical records (HIPAA-regulated)
  • Driver's license scans
  • Payment card data (PCI-DSS regulated)
  • Purchase history (privacy laws apply)
  • Employee Social Security numbers
  • Cash handling records (IRS reporting)

If you get breached, you're liable for ALL of it.


The 7 Deadly POS Misconfigurations

Here are the most common mistakes we see (and how attackers exploit them):

1. Default Credentials Still Active

What we see:

  • Admin username: admin
  • Password: admin123 or password or the dispensary name

How attackers exploit it:

  • Try common default credentials from manufacturer documentation
  • Gain full administrative access in under 60 seconds
  • Modify inventory, steal customer data, inject malware

Real example: California dispensary got breached because their Treez admin account was still set to the default password. Attackers modified Metrc inventory reports, triggering a state compliance audit. Penalty: $52,500.

Fix: Change ALL default credentials immediately. Use a password manager to generate strong, unique passwords for every admin account.


2. Shared "Budtender" Accounts

What we see:

  • One login for all budtenders: budtender1 / password123
  • No individual user accounts
  • No audit trail of who did what

How attackers exploit it:

  • Disgruntled employee steals customer database
  • No way to trace who accessed what
  • Impossible to investigate internal theft

Compliance issue: State regulators require individual accountability for Metrc transactions. Shared accounts = automatic audit failure in most states.

Fix: Create individual user accounts for every employee. Disable accounts immediately when employees leave.

SSAE 16/18 Physical Security Assessment Tool
Evaluate and document physical security controls for SSAE 16/18 compliance with our comprehensive assessment framework.

Read more