PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition.
The attacker must have physical USB access to the device in order to exploit this vulnerability.
References
Link | Resource |
---|---|
https://blog.stmcyber.com/pax-pos-cves-2023/ | Exploit Third Party Advisory |
https://cert.pl/en/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://cert.pl/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://ppn.paxengine.com/release/development | Permissions Required |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: CERT-PL
Published: 2024-01-15T13:28:55.478Z
Updated: 2024-01-15T13:45:01.681Z
Reserved: 2023-09-07T13:17:57.372Z
Link: CVE-2023-42135
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-15T14:15:24.413
Modified: 2024-01-19T15:47:29.607
Link: CVE-2023-42135
JSON object: View
Redhat Information
No data.