CVE-2023-42136

PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow the execution of arbitrary commands with system account privilege by shell injection starting with a specific word. The attacker must have shell access to the device in order to exploit this vulnerability.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a6650:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a800:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a77:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_max:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:d190:-:*:*:*:*:*:*:*

History

19 Jan 2024, 16:19

Type Values Removed Values Added
CWE CWE-74
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Paxtechnology a800
Paxtechnology a50
Paxtechnology a6650
Paxtechnology d190
Paxtechnology a920 Pro
Paxtechnology
Paxtechnology a920
Paxtechnology paydroid
Paxtechnology a920 Max
Paxtechnology a77
References () https://ppn.paxengine.com/release/development - () https://ppn.paxengine.com/release/development - Permissions Required
References () https://blog.stmcyber.com/pax-pos-cves-2023/ - () https://blog.stmcyber.com/pax-pos-cves-2023/ - Exploit, Third Party Advisory
References () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - Third Party Advisory
References () https://cert.pl/posts/2024/01/CVE-2023-4818/ - () https://cert.pl/posts/2024/01/CVE-2023-4818/ - Third Party Advisory
CPE cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a77:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:d190:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a6650:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_max:-:*:*:*:*:*:*:*
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a800:-:*:*:*:*:*:*:*

15 Jan 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-15 14:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-42136

Mitre link : CVE-2023-42136

CVE.ORG link : CVE-2023-42136


JSON object : View

Products Affected

paxtechnology

  • a920_max
  • a77
  • a920_pro
  • paydroid
  • a50
  • a800
  • a920
  • d190
  • a6650
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-20

Improper Input Validation