{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-42134","assignerOrgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","state":"PUBLISHED","assignerShortName":"CERT-PL","dateReserved":"2023-09-07T13:17:57.372Z","datePublished":"2024-01-15T13:28:53.397Z","dateUpdated":"2025-06-17T21:09:22.365Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Android"],"product":"POS terminals","vendor":"PAX Technology","versions":[{"lessThanOrEqual":"11.1.45_20230314","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Hubert Jasudowicz, Adam Kliś and other members of STM Cyber R&D team"}],"datePublic":"2024-01-15T11:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.45_20230314 or earlier can allow the signed partition overwrite and subsequently local code execution via hidden command.<div><br></div><div><br></div>The attacker must have physical USB access to the device in order to exploit this vulnerability.<br>"}],"value":"PAX Android based POS devices with PayDroid_8.1.0_Sagittarius_V11.1.45_20230314 or earlier can allow the signed partition overwrite and subsequently local code execution via hidden command.\n\n\n\n\n\nThe attacker must have physical USB access to the device in order to exploit this vulnerability.\n"}],"impacts":[{"capecId":"CAPEC-549","descriptions":[{"lang":"en","value":"CAPEC-549 Local Execution of Code"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"PHYSICAL","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-912","description":"CWE-912: Hidden Functionality","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4bb8329e-dd38-46c1-aafb-9bf32bcb93c6","shortName":"CERT-PL","dateUpdated":"2024-01-15T13:28:53.397Z"},"references":[{"tags":["vendor-advisory"],"url":"https://ppn.paxengine.com/release/development"},{"tags":["technical-description"],"url":"https://blog.stmcyber.com/pax-pos-cves-2023/"},{"tags":["third-party-advisory"],"url":"https://cert.pl/en/posts/2024/01/CVE-2023-4818/"},{"tags":["third-party-advisory"],"url":"https://cert.pl/posts/2024/01/CVE-2023-4818/"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T19:16:50.567Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://ppn.paxengine.com/release/development"},{"tags":["technical-description","x_transferred"],"url":"https://blog.stmcyber.com/pax-pos-cves-2023/"},{"tags":["third-party-advisory","x_transferred"],"url":"https://cert.pl/en/posts/2024/01/CVE-2023-4818/"},{"tags":["third-party-advisory","x_transferred"],"url":"https://cert.pl/posts/2024/01/CVE-2023-4818/"}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-42134","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-01-16T15:46:58.995811Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-17T21:09:22.365Z"}}]}}