CVE ID | CVE-2023-4818 |
Publication date | 15 January 2024 |
Vendor | PAX Technology |
Product | A920 |
Vulnerable versions | All through A920_AP_Boot_Release_V5.14 |
Vulnerability type (CWE) | Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74) |
Report source | Report to CERT Polska |
CVE ID | CVE-2023-42134 |
Publication date | 15 January 2024 |
Vendor | PAX Technology |
Product | All Android based PAX POS terminals |
Vulnerable versions | All through 11.1.45_20230314 |
Vulnerability type (CWE) | Hidden Functionality (CWE-912) |
Report source | Report to CERT Polska |
CVE ID | CVE-2023-42135 |
Publication date | 15 January 2024 |
Vendor | PAX Technology |
Product | A920 Pro and A50 |
Vulnerable versions | All through 11.1.50_20230614 |
Vulnerability type (CWE) | Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74) |
Report source | Report to CERT Polska |
CVE ID | CVE-2023-42136 |
Publication date | 15 January 2024 |
Vendor | PAX Technology |
Product | All Android based POS terminals |
Vulnerable versions | All through 11.1.50_20230614 |
Vulnerability type (CWE) | Improper Neutralization of Special Elements used in a Command ('Command Injection') (CWE-77) |
Report source | Report to CERT Polska |
CVE ID | CVE-2023-42137 |
Publication date | 15 January 2024 |
Vendor | PAX Technology |
Product | All Android based POS terminals |
Vulnerable versions | All through 11.1.50_20230614 |
Vulnerability type (CWE) | Improper Link Resolution Before File Access ('Link Following') (CWE-59) |
Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities found in multiple Point Of Sale (POS) devices produced by PAX and participated in coordination of their disclosure. All the vulnerabilities have been confirmed by the vendor and fixed in newer releases. Details of the reported bugs can be found on the researchers blog post.
- The vulnerability CVE-2023-4818 in PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used. The attacker must have physical USB access to the device in order to exploit this vulnerability.
- The vulnerability CVE-2023-42134 in all PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.45_20230314 or earlier can allow the signed partition overwrite and subsequently local code execution via a hidden command. The attacker must have physical USB access to the device in order to exploit this vulnerability.
- The vulnerability CVE-2023-42135 in PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. The attacker must have physical USB access to the device in order to exploit this vulnerability.
- The vulnerability CVE-2023-42136 in all PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow the execution of arbitrary commands with system account privilege by shell injection starting with a specific word. The attacker must have shell access to the device in order to exploit this vulnerability.
- The vulnerability CVE-2023-42137 in all PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks. The attacker must have shell access to the device in order to exploit this vulnerability.
Credits
We thank Hubert Jasudowicz, Adam Kliś and other members of STM Cyber R&D team for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.