CVE-2023-42137

PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks. The attacker must have shell access to the device in order to exploit this vulnerability.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a6650:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a800:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a77:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_max:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:d190:-:*:*:*:*:*:*:*

History

19 Jan 2024, 16:21

Type Values Removed Values Added
CPE cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a77:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:d190:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a6650:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a800:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a920_max:-:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*
CWE CWE-59
First Time Paxtechnology
Paxtechnology d190
Paxtechnology a920 Max
Paxtechnology a920 Pro
Paxtechnology a800
Paxtechnology a77
Paxtechnology a50
Paxtechnology a6650
Paxtechnology paydroid
Paxtechnology a920
References () https://blog.stmcyber.com/pax-pos-cves-2023/ - () https://blog.stmcyber.com/pax-pos-cves-2023/ - Exploit, Third Party Advisory
References () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - () https://cert.pl/en/posts/2024/01/CVE-2023-4818/ - Third Party Advisory
References () https://cert.pl/posts/2024/01/CVE-2023-4818/ - () https://cert.pl/posts/2024/01/CVE-2023-4818/ - Third Party Advisory
References () https://ppn.paxengine.com/release/development - () https://ppn.paxengine.com/release/development - Permissions Required

16 Jan 2024, 13:56

Type Values Removed Values Added
Summary
  • (es) Los dispositivos POS PAX basados en Android con PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 o anterior pueden permitir la ejecución de comandos con altos privilegios mediante el uso de enlaces simbólicos maliciosos. El atacante debe tener acceso de shell al dispositivo para poder aprovechar esta vulnerabilidad.

15 Jan 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-15 14:15

Updated : 2024-01-19 16:21


NVD link : CVE-2023-42137

Mitre link : CVE-2023-42137

CVE.ORG link : CVE-2023-42137


JSON object : View

Products Affected

paxtechnology

  • a800
  • a50
  • a77
  • a920
  • paydroid
  • d190
  • a920_max
  • a920_pro
  • a6650
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')

CWE-20

Improper Input Validation