2024-01-15 15:00:28 +00:00
{
"id" : "CVE-2023-42136" ,
"sourceIdentifier" : "cvd@cert.pl" ,
"published" : "2024-01-15T14:15:24.670" ,
2024-10-10 18:03:19 +00:00
"lastModified" : "2024-10-10T16:15:05.880" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-01-15 15:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow the execution of arbitrary commands with system account privilege by shell injection starting with a specific word.\n\n\n\n\nThe attacker must have shell access to the device in order to exploit this vulnerability."
2024-01-16 15:00:29 +00:00
} ,
{
"lang" : "es" ,
"value" : "Los dispositivos POS PAX basados en Android con PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 o anterior pueden permitir la ejecuci\u00f3n de comandos arbitrarios con privilegios de cuenta del sistema mediante inyecci\u00f3n de shell comenzando con una palabra espec\u00edfica. El atacante debe tener acceso de shell al dispositivo para poder aprovechar esta vulnerabilidad."
2024-01-15 15:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-01-19 17:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
2024-01-15 15:00:28 +00:00
{
"source" : "cvd@cert.pl" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
2024-01-19 17:00:29 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-74"
}
]
} ,
2024-01-15 15:00:28 +00:00
{
"source" : "cvd@cert.pl" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
2024-10-10 18:03:19 +00:00
"value" : "CWE-77"
2024-01-15 15:00:28 +00:00
}
]
}
] ,
2024-01-19 17:00:29 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.1.0_sagittarius_11.1.50_20230614" ,
"matchCriteriaId" : "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DFCCCD93-0374-4AE1-8986-E0997B53A51C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.1.0_sagittarius_11.1.50_20230614" ,
"matchCriteriaId" : "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:paxtechnology:a6650:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8C020172-6E0C-4265-B4C9-ED93C84FE8AA"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.1.0_sagittarius_11.1.50_20230614" ,
"matchCriteriaId" : "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:paxtechnology:a800:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "AFCD5218-5AA0-4086-926C-3EAEE1E43136"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.1.0_sagittarius_11.1.50_20230614" ,
"matchCriteriaId" : "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:paxtechnology:a77:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0390BD9D-1FF7-456E-9394-34F009DE82CF"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.1.0_sagittarius_11.1.50_20230614" ,
"matchCriteriaId" : "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:paxtechnology:a920:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D351F870-D43F-48B4-B2AC-0FDDD7B82ED4"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.1.0_sagittarius_11.1.50_20230614" ,
"matchCriteriaId" : "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF80918D-3453-4F42-A8A0-DA993C398394"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.1.0_sagittarius_11.1.50_20230614" ,
"matchCriteriaId" : "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:paxtechnology:a920_max:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8612B592-DFE4-4B66-B24D-71EEA747FAA2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "8.1.0_sagittarius_11.1.50_20230614" ,
"matchCriteriaId" : "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:paxtechnology:d190:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DB9483F8-5201-4F31-9F9A-F00A48C4C972"
}
]
}
]
}
] ,
2024-01-15 15:00:28 +00:00
"references" : [
{
"url" : "https://blog.stmcyber.com/pax-pos-cves-2023/" ,
2024-01-19 17:00:29 +00:00
"source" : "cvd@cert.pl" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-01-15 15:00:28 +00:00
} ,
{
"url" : "https://cert.pl/en/posts/2024/01/CVE-2023-4818/" ,
2024-01-19 17:00:29 +00:00
"source" : "cvd@cert.pl" ,
"tags" : [
"Third Party Advisory"
]
2024-01-15 15:00:28 +00:00
} ,
{
"url" : "https://cert.pl/posts/2024/01/CVE-2023-4818/" ,
2024-01-19 17:00:29 +00:00
"source" : "cvd@cert.pl" ,
"tags" : [
"Third Party Advisory"
]
2024-01-15 15:00:28 +00:00
} ,
{
"url" : "https://ppn.paxengine.com/release/development" ,
2024-01-19 17:00:29 +00:00
"source" : "cvd@cert.pl" ,
"tags" : [
"Permissions Required"
]
2024-01-15 15:00:28 +00:00
}
]
}