CVE-2023-42135 (GCVE-0-2023-42135)

Vulnerability from cvelistv5 – Published: 2024-01-15 13:28 – Updated: 2025-06-17 21:09
VLAI?
Summary
PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. The attacker must have physical USB access to the device in order to exploit this vulnerability.
CWE
  • CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Assigner
Impacted products
Vendor Product Version
PAX Technology A920 Pro Affected: 0 , ≤ 11.1.50_20230614 (custom)
Create a notification for this product.
    PAX Technology A50 Affected: 0 , ≤ 11.1.50_20230614 (custom)
Create a notification for this product.
Date Public ?
2024-01-15 11:00
Credits
Hubert Jasudowicz, Adam Kliś and other members of STM Cyber R&D team
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T19:16:50.611Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://ppn.paxengine.com/release/development"
          },
          {
            "tags": [
              "technical-description",
              "x_transferred"
            ],
            "url": "https://blog.stmcyber.com/pax-pos-cves-2023/"
          },
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://cert.pl/en/posts/2024/01/CVE-2023-4818/"
          },
          {
            "tags": [
              "third-party-advisory",
              "x_transferred"
            ],
            "url": "https://cert.pl/posts/2024/01/CVE-2023-4818/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-42135",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-16T15:48:04.937541Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-17T21:09:22.557Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "A920 Pro",
          "vendor": "PAX Technology",
          "versions": [
            {
              "lessThanOrEqual": "11.1.50_20230614",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "A50",
          "vendor": "PAX Technology",
          "versions": [
            {
              "lessThanOrEqual": "11.1.50_20230614",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Hubert Jasudowicz, Adam Kli\u015b and other members of STM Cyber R\u0026D team"
        }
      ],
      "datePublic": "2024-01-15T11:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003ePAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. \u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003eThe attacker must have physical USB access to the device in order to exploit this vulnerability."
            }
          ],
          "value": "PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. \n\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-549",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-549 Local Execution of Code"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-74",
              "description": "CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-10T15:35:54.082Z",
        "orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
        "shortName": "CERT-PL"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://ppn.paxengine.com/release/development"
        },
        {
          "tags": [
            "technical-description"
          ],
          "url": "https://blog.stmcyber.com/pax-pos-cves-2023/"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://cert.pl/en/posts/2024/01/CVE-2023-4818/"
        },
        {
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://cert.pl/posts/2024/01/CVE-2023-4818/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
    "assignerShortName": "CERT-PL",
    "cveId": "CVE-2023-42135",
    "datePublished": "2024-01-15T13:28:55.478Z",
    "dateReserved": "2023-09-07T13:17:57.372Z",
    "dateUpdated": "2025-06-17T21:09:22.557Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2023-42135",
      "date": "2026-04-25",
      "epss": "0.00049",
      "percentile": "0.15292"
    },
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.1.0_sagittarius_11.1.50_20230614\", \"matchCriteriaId\": \"970DD715-DA0A-4E3B-A51A-4B04EEC55CC8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF80918D-3453-4F42-A8A0-DA993C398394\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"8.1.0_sagittarius_11.1.50_20230614\", \"matchCriteriaId\": \"970DD715-DA0A-4E3B-A51A-4B04EEC55CC8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFCCCD93-0374-4AE1-8986-E0997B53A51C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. \\n\\n\\n\\n\\n\\nThe attacker must have physical USB access to the device in order to exploit this vulnerability.\"}, {\"lang\": \"es\", \"value\": \"Los dispositivos PAX A920Pro/A50 con PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 o anterior pueden permitir la ejecuci\\u00f3n de c\\u00f3digo local mediante inyecci\\u00f3n de par\\u00e1metros al omitir la validaci\\u00f3n de entrada al actualizar una partici\\u00f3n espec\\u00edfica. El atacante debe tener acceso USB f\\u00edsico al dispositivo para poder aprovechar esta vulnerabilidad.\"}]",
      "id": "CVE-2023-42135",
      "lastModified": "2024-11-21T08:22:20.747",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"cvd@cert.pl\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 5.9}]}",
      "published": "2024-01-15T14:15:24.413",
      "references": "[{\"url\": \"https://blog.stmcyber.com/pax-pos-cves-2023/\", \"source\": \"cvd@cert.pl\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://cert.pl/en/posts/2024/01/CVE-2023-4818/\", \"source\": \"cvd@cert.pl\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert.pl/posts/2024/01/CVE-2023-4818/\", \"source\": \"cvd@cert.pl\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://ppn.paxengine.com/release/development\", \"source\": \"cvd@cert.pl\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://blog.stmcyber.com/pax-pos-cves-2023/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://cert.pl/en/posts/2024/01/CVE-2023-4818/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://cert.pl/posts/2024/01/CVE-2023-4818/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://ppn.paxengine.com/release/development\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}]",
      "sourceIdentifier": "cvd@cert.pl",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"cvd@cert.pl\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-74\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-74\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-42135\",\"sourceIdentifier\":\"cvd@cert.pl\",\"published\":\"2024-01-15T14:15:24.413\",\"lastModified\":\"2024-11-21T08:22:20.747\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. \\n\\n\\n\\n\\n\\nThe attacker must have physical USB access to the device in order to exploit this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Los dispositivos PAX A920Pro/A50 con PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 o anterior pueden permitir la ejecuci\u00f3n de c\u00f3digo local mediante inyecci\u00f3n de par\u00e1metros al omitir la validaci\u00f3n de entrada al actualizar una partici\u00f3n espec\u00edfica. El atacante debe tener acceso USB f\u00edsico al dispositivo para poder aprovechar esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cvd@cert.pl\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"cvd@cert.pl\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.1.0_sagittarius_11.1.50_20230614\",\"matchCriteriaId\":\"970DD715-DA0A-4E3B-A51A-4B04EEC55CC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF80918D-3453-4F42-A8A0-DA993C398394\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"8.1.0_sagittarius_11.1.50_20230614\",\"matchCriteriaId\":\"970DD715-DA0A-4E3B-A51A-4B04EEC55CC8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFCCCD93-0374-4AE1-8986-E0997B53A51C\"}]}]}],\"references\":[{\"url\":\"https://blog.stmcyber.com/pax-pos-cves-2023/\",\"source\":\"cvd@cert.pl\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://cert.pl/en/posts/2024/01/CVE-2023-4818/\",\"source\":\"cvd@cert.pl\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.pl/posts/2024/01/CVE-2023-4818/\",\"source\":\"cvd@cert.pl\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://ppn.paxengine.com/release/development\",\"source\":\"cvd@cert.pl\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://blog.stmcyber.com/pax-pos-cves-2023/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://cert.pl/en/posts/2024/01/CVE-2023-4818/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.pl/posts/2024/01/CVE-2023-4818/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://ppn.paxengine.com/release/development\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…