CVE-2023-42135

PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. The attacker must have physical USB access to the device in order to exploit this vulnerability.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*

History

19 Jan 2024, 15:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
CPE cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*
First Time Paxtechnology paydroid
Paxtechnology a50
Paxtechnology a920 Pro
Paxtechnology
CWE CWE-74
References () https://ppn.paxengine.com/release/development - () https://ppn.paxengine.com/release/development - Permissions Required
References () https://blog.stmcyber.com/pax-pos-cves-2023/ - () https://blog.stmcyber.com/pax-pos-cves-2023/ - Exploit, Third Party Advisory
References () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - Third Party Advisory
References () https://cert.pl/posts/2024/01/CVE-2023-4818/ - () https://cert.pl/posts/2024/01/CVE-2023-4818/ - Third Party Advisory

15 Jan 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-15 14:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-42135

Mitre link : CVE-2023-42135

CVE.ORG link : CVE-2023-42135


JSON object : View

Products Affected

paxtechnology

  • a920_pro
  • paydroid
  • a50
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-20

Improper Input Validation