PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used.
The attacker must have physical USB access to the device in order to exploit this vulnerability.
References
Link | Resource |
---|---|
https://blog.stmcyber.com/pax-pos-cves-2023/ | Exploit Third Party Advisory |
https://cert.pl/en/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://cert.pl/posts/2024/01/CVE-2023-4818/ | Third Party Advisory |
https://ppn.paxengine.com/release/development | Permissions Required |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: CERT-PL
Published: 2024-01-15T13:28:53.084Z
Updated: 2024-01-15T13:28:53.084Z
Reserved: 2023-09-07T13:18:09.776Z
Link: CVE-2023-4818
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-01-15T14:15:25.180
Modified: 2024-01-19T16:35:49.683
Link: CVE-2023-4818
JSON object: View
Redhat Information
No data.