PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow for command execution with high privileges by using malicious symlinks.
The attacker must have shell access to the device in order to exploit this vulnerability.
References
Link | Resource |
---|---|
https://blog.stmcyber.com/pax-pos-cves-2023/ | Exploit Third Party Advisory |
https://cert.pl/en/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://cert.pl/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://ppn.paxengine.com/release/development | Permissions Required |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: CERT-PL
Published: 2024-01-15T13:28:59.106Z
Updated: 2024-01-15T13:28:59.106Z
Reserved: 2023-09-07T13:17:57.372Z
Link: CVE-2023-42137
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-15T14:15:24.900
Modified: 2024-01-19T16:21:06.650
Link: CVE-2023-42137
JSON object: View
Redhat Information
No data.