CVE-2023-42137

PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks. The attacker must have shell access to the device in order to exploit this vulnerability.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a6650:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a800:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a77:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_max:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:d190:-:*:*:*:*:*:*:*

History

19 Jan 2024, 16:21

Type Values Removed Values Added
References () https://ppn.paxengine.com/release/development - () https://ppn.paxengine.com/release/development - Permissions Required
References () https://blog.stmcyber.com/pax-pos-cves-2023/ - () https://blog.stmcyber.com/pax-pos-cves-2023/ - Exploit, Third Party Advisory
References () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - Third Party Advisory
References () https://cert.pl/posts/2024/01/CVE-2023-4818/ - () https://cert.pl/posts/2024/01/CVE-2023-4818/ - Third Party Advisory
CPE cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a77:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:d190:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a6650:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_max:-:*:*:*:*:*:*:*
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a800:-:*:*:*:*:*:*:*
CWE CWE-59
First Time Paxtechnology a800
Paxtechnology a50
Paxtechnology a6650
Paxtechnology d190
Paxtechnology a920 Pro
Paxtechnology
Paxtechnology a920
Paxtechnology paydroid
Paxtechnology a920 Max
Paxtechnology a77
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8

15 Jan 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-15 14:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-42137

Mitre link : CVE-2023-42137

CVE.ORG link : CVE-2023-42137


JSON object : View

Products Affected

paxtechnology

  • a920_max
  • a77
  • a920_pro
  • paydroid
  • a50
  • a800
  • a920
  • d190
  • a6650
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')

CWE-20

Improper Input Validation