Report an incident
Report an incident

Several vulnerabilities in PAX payment terminals
15 January 2024 | CERT Polska | #vulnerability, #warning, #cve
CVE ID CVE-2023-4818
Publication date 15 January 2024
Vendor PAX Technology
Product A920
Vulnerable versions All through A920_AP_Boot_Release_V5.14
Vulnerability type (CWE) Improper Input Validation (CWE-20)
Report source Report to CERT Polska
CVE ID CVE-2023-42134
Publication date 15 January 2024
Vendor PAX Technology
Product All Android based PAX POS terminals
Vulnerable versions All through 11.1.45_20230314
Vulnerability type (CWE) Hidden Functionality (CWE-912)
Report source Report to CERT Polska
CVE ID CVE-2023-42135
Publication date 15 January 2024
Vendor PAX Technology
Product A920 Pro and A50
Vulnerable versions All through 11.1.50_20230614
Vulnerability type (CWE) Improper Input Validation (CWE-20)
Report source Report to CERT Polska
CVE ID CVE-2023-42136
Publication date 15 January 2024
Vendor PAX Technology
Product All Android based POS terminals
Vulnerable versions All through 11.1.50_20230614
Vulnerability type (CWE) Improper Input Validation (CWE-20)
Report source Report to CERT Polska
CVE ID CVE-2023-42137
Publication date 15 January 2024
Vendor PAX Technology
Product All Android based POS terminals
Vulnerable versions All through 11.1.50_20230614
Vulnerability type (CWE) Improper Input Validation (CWE-20)
Report source Report to CERT Polska

Description

CERT Polska has received a report about vulnerabilities found in multiple Point Of Sale (POS) devices produced by PAX and participated in coordination of their disclosure. All the vulnerabilities have been confirmed by the vendor and fixed in newer releases. Details of the reported bugs can be found on the researchers blog post.

  • The vulnerability CVE-2023-4818 in PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used. The attacker must have physical USB access to the device in order to exploit this vulnerability.
  • The vulnerability CVE-2023-42134 in all PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.45_20230314 or earlier can allow the signed partition overwrite and subsequently local code execution via a hidden command. The attacker must have physical USB access to the device in order to exploit this vulnerability.
  • The vulnerability CVE-2023-42135 in PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. The attacker must have physical USB access to the device in order to exploit this vulnerability.
  • The vulnerability CVE-2023-42136 in all PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow the execution of arbitrary commands with system account privilege by shell injection starting with a specific word. The attacker must have shell access to the device in order to exploit this vulnerability.
  • The vulnerability CVE-2023-42137 in all PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks. The attacker must have shell access to the device in order to exploit this vulnerability.

Credits

We thank Hubert Jasudowicz, Adam Kliś and other members of STM Cyber R&D team for the responsible vulnerability report.


More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.