Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » PAX PoS terminal flaw could allow attackers to tamper with transactions
    Cyber Security

    PAX PoS terminal flaw could allow attackers to tamper with transactions

    techempireBy techempire1 Comment2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 17, 2024Editorial DepartmentFinancial data/vulnerabilities

    point of sale

    PAX Technology’s point-of-sale (PoS) terminals are affected by a series of high-severity vulnerabilities that could be exploited by threat actors to execute arbitrary code.

    The STM Cyber ​​research and development team reverse-engineered the rapid deployment of Android devices made by the Chinese company in Poland and said it discovered six vulnerabilities that allowed privilege escalation and local code execution from the bootloader.

    Internet security

    Details about one of the vulnerabilities (CVE-2023-42133) have been withheld. Other defects are as follows –

    • CVE-2023-42134 and CVE-2023-42135 (CVSS score: 7.6) – Execute native code as root via core parameter injection in fastboot (affects PAX A920Pro/PAX A50)
    • CVE-2023-42136 (CVSS score: 8.8) – Privilege escalation from any user/application to system user via shell injection binder exposed service (affects all Android-based PAX PoS devices)
    • CVE-2023-42137 (CVSS Rating: 8.8) – Escalating privileges from system/shell user to root via unsafe operation in systool_server daemon (affects all Android-based PAX PoS devices)
    • CVE-2023-4818 (CVSS Rating: 7.3) – Bootloader degradation via incorrect tokenization (affects PAX A920)

    Successful exploitation of the above mentioned weaknesses could allow an attacker to elevate root privileges and bypass sandbox protection, effectively gaining full access to perform any operation.

    Internet security

    This includes interfering with payment operations to “modify the data sent to the merchant application” [Secure Processor]which includes the transaction amount,” said security researchers Adam Kliś and Hubert Jasudowicz.

    It is worth mentioning that exploiting CVE-2023-42136 and CVE-2023-42137 requires the attacker to have shell access to the device, while the remaining three require the attacker to have physical USB access to it.

    The Warsaw-based penetration testing company said it responsibly disclosed the flaws in early May 2023 to PAX Technology, which released a patch in November 2023.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.