GSD-2023-42135

Vulnerability from gsd - Updated: 2023-12-13 01:20
Details
PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. The attacker must have physical USB access to the device in order to exploit this vulnerability.
Aliases
Aliases

{
  "GSD": {
    "alias": "CVE-2023-42135",
    "id": "GSD-2023-42135"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-42135"
      ],
      "details": "PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. \n\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability.",
      "id": "GSD-2023-42135",
      "modified": "2023-12-13T01:20:21.589076Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cvd@cert.pl",
        "ID": "CVE-2023-42135",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "A920 Pro",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003c=",
                          "version_name": "0",
                          "version_value": "11.1.50_20230614"
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "A50",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003c=",
                          "version_name": "0",
                          "version_value": "11.1.50_20230614"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "PAX Technology"
            }
          ]
        }
      },
      "credits": [
        {
          "lang": "en",
          "value": "Hubert Jasudowicz, Adam Kli\u015b and other members of STM Cyber R\u0026D team"
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. \n\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability."
          }
        ]
      },
      "generator": {
        "engine": "Vulnogram 0.1.0-dev"
      },
      "impact": {
        "cvss": [
          {
            "attackComplexity": "LOW",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-20",
                "lang": "eng",
                "value": "CWE-20 Improper Input Validation"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://ppn.paxengine.com/release/development",
            "refsource": "MISC",
            "url": "https://ppn.paxengine.com/release/development"
          },
          {
            "name": "https://blog.stmcyber.com/pax-pos-cves-2023/",
            "refsource": "MISC",
            "url": "https://blog.stmcyber.com/pax-pos-cves-2023/"
          },
          {
            "name": "https://cert.pl/en/posts/2024/01/CVE-2023-4818/",
            "refsource": "MISC",
            "url": "https://cert.pl/en/posts/2024/01/CVE-2023-4818/"
          },
          {
            "name": "https://cert.pl/posts/2024/01/CVE-2023-4818/",
            "refsource": "MISC",
            "url": "https://cert.pl/posts/2024/01/CVE-2023-4818/"
          }
        ]
      },
      "source": {
        "discovery": "UNKNOWN"
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8",
                    "versionEndIncluding": "8.1.0_sagittarius_11.1.50_20230614",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:paxtechnology:a920_pro:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FF80918D-3453-4F42-A8A0-DA993C398394",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:paxtechnology:paydroid:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "970DD715-DA0A-4E3B-A51A-4B04EEC55CC8",
                    "versionEndIncluding": "8.1.0_sagittarius_11.1.50_20230614",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:paxtechnology:a50:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DFCCCD93-0374-4AE1-8986-E0997B53A51C",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "PAX A920Pro/A50 devices with PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 or earlier can allow local code execution via parameter injection by bypassing the input validation when flashing a specific partition. \n\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability."
          },
          {
            "lang": "es",
            "value": "Los dispositivos PAX A920Pro/A50 con PayDroid_8.1.0_Sagittarius_V11.1.50_20230614 o anterior pueden permitir la ejecuci\u00f3n de c\u00f3digo local mediante inyecci\u00f3n de par\u00e1metros al omitir la validaci\u00f3n de entrada al actualizar una partici\u00f3n espec\u00edfica. El atacante debe tener acceso USB f\u00edsico al dispositivo para poder aprovechar esta vulnerabilidad."
          }
        ],
        "id": "CVE-2023-42135",
        "lastModified": "2024-01-19T15:47:29.607",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "PHYSICAL",
                "availabilityImpact": "HIGH",
                "baseScore": 6.8,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 0.9,
              "impactScore": 5.9,
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "PHYSICAL",
                "availabilityImpact": "HIGH",
                "baseScore": 6.8,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "HIGH",
                "privilegesRequired": "NONE",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 0.9,
              "impactScore": 5.9,
              "source": "cvd@cert.pl",
              "type": "Secondary"
            }
          ]
        },
        "published": "2024-01-15T14:15:24.413",
        "references": [
          {
            "source": "cvd@cert.pl",
            "tags": [
              "Exploit",
              "Third Party Advisory"
            ],
            "url": "https://blog.stmcyber.com/pax-pos-cves-2023/"
          },
          {
            "source": "cvd@cert.pl",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://cert.pl/en/posts/2024/01/CVE-2023-4818/"
          },
          {
            "source": "cvd@cert.pl",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://cert.pl/posts/2024/01/CVE-2023-4818/"
          },
          {
            "source": "cvd@cert.pl",
            "tags": [
              "Permissions Required"
            ],
            "url": "https://ppn.paxengine.com/release/development"
          }
        ],
        "sourceIdentifier": "cvd@cert.pl",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-74"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-20"
              }
            ],
            "source": "cvd@cert.pl",
            "type": "Secondary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…