cve/2023/CVE-2023-4818.md

18 lines
810 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-4818](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4818)
![](https://img.shields.io/static/v1?label=Product&message=A920&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20A920_AP_Boot_Release_V5.14%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen)
### Description
PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used. The attacker must have physical USB access to the device in order to exploit this vulnerability.
### POC
#### Reference
- https://blog.stmcyber.com/pax-pos-cves-2023/
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds