PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks.
The attacker must have shell access to the device in order to exploit this vulnerability.
References
Link | Resource |
---|---|
https://blog.stmcyber.com/pax-pos-cves-2023/ | Exploit Third Party Advisory |
https://cert.pl/en/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://cert.pl/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://ppn.paxengine.com/release/development | Permissions Required |
https://blog.stmcyber.com/pax-pos-cves-2023/ | Exploit Third Party Advisory |
https://cert.pl/en/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://cert.pl/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://ppn.paxengine.com/release/development | Permissions Required |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
21 Nov 2024, 08:22
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.stmcyber.com/pax-pos-cves-2023/ - Exploit, Third Party Advisory | |
References | () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - Third Party Advisory | |
References | () https://cert.pl/posts/2024/01/CVE-2023-4818/ - Third Party Advisory | |
References | () https://ppn.paxengine.com/release/development - Permissions Required |
10 Oct 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
Summary | (en) PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks. The attacker must have shell access to the device in order to exploit this vulnerability. |
19 Jan 2024, 16:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:a77:-:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:d190:-:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:a920:-:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:a6650:-:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:a920_max:-:*:*:*:*:*:*:* cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:* cpe:2.3:h:paxtechnology:a800:-:*:*:*:*:*:*:* |
|
References | () https://ppn.paxengine.com/release/development - Permissions Required | |
References | () https://blog.stmcyber.com/pax-pos-cves-2023/ - Exploit, Third Party Advisory | |
References | () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - Third Party Advisory | |
References | () https://cert.pl/posts/2024/01/CVE-2023-4818/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CWE | CWE-59 | |
First Time |
Paxtechnology a800
Paxtechnology a50 Paxtechnology a6650 Paxtechnology d190 Paxtechnology a920 Pro Paxtechnology Paxtechnology a920 Paxtechnology paydroid Paxtechnology a920 Max Paxtechnology a77 |
15 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-01-15 14:15
Updated : 2024-11-21 08:22
NVD link : CVE-2023-42137
Mitre link : CVE-2023-42137
CVE.ORG link : CVE-2023-42137
JSON object : View
Products Affected
paxtechnology
- d190
- a920_max
- a800
- paydroid
- a6650
- a77
- a50
- a920
- a920_pro
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')