PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.45_20230314 or earlier can allow the signed partition overwrite and subsequently local code execution via hidden command.
The attacker must have physical USB access to the device in order to exploit this vulnerability.
References
Link | Resource |
---|---|
https://ppn.paxengine.com/release/development | Permissions Required |
https://blog.stmcyber.com/pax-pos-cves-2023/ | Exploit Third Party Advisory |
https://cert.pl/en/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://cert.pl/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
Configurations
History
19 Jan 2024, 16:14
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other | |
First Time |
Paxtechnology paydroid
Paxtechnology a920 Pro Paxtechnology a50 Paxtechnology |
|
CPE | cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
References | () https://ppn.paxengine.com/release/development - Permissions Required | |
References | () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - Third Party Advisory | |
References | () https://cert.pl/posts/2024/01/CVE-2023-4818/ - Third Party Advisory | |
References | () https://blog.stmcyber.com/pax-pos-cves-2023/ - Exploit, Third Party Advisory |
15 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-15 14:15
Updated : 2024-01-19 16:14
NVD link : CVE-2023-42134
Mitre link : CVE-2023-42134
JSON object : View
Products Affected
paxtechnology
- a50
- a920_pro
- paydroid
CWE