Article Details
Scrape Timestamp (UTC): 2024-01-17 13:55:42.137
Source: https://thehackernews.com/2024/01/pax-pos-terminal-flaw-could-allow.html
Original Article Text
Click to Toggle View
PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions. The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity vulnerabilities that can be weaponized by threat actors to execute arbitrary code. The STM Cyber R&D team, which reverse engineered the Android-based devices manufactured by the Chinese firm owing to their rapid deployment in Poland, said it unearthed half a dozen flaws that allow for privilege escalation and local code execution from the bootloader. Details about one of the vulnerabilities (CVE-2023-42133) have been currently withheld. The other flaws are listed below - Successful exploitation of the aforementioned weaknesses could permit an attacker to elevate their privileges to root and bypass sandboxing protections, effectively gaining carte blanche access to perform any operation. This includes interfering with the payment operations to "modify data the merchant application sends to the [Secure Processor], which includes transaction amount," security researchers Adam Kliś and Hubert Jasudowicz said. It's worth mentioning that exploiting CVE-2023-42136 and CVE-2023-42137 requires an attacker to have shell access to the device, while the remaining three necessitate that the threat actor has physical USB access to it. The Warsaw-based penetration testing company said it responsibly disclosed the flaws to PAX Technology in early May 2023, following which patches were released by the latter in November 2023. Report: Unveiling the Threat of Malicious Browser Extensions Download the Report to learn the Risks of Malicious Extensions and How to Mitigate Them. Firewalls vs. Zero Trust: Minimize Your Attack Surface Learn latest trends in the attack landscape, attacker strategies, and how to implement Zero Trust Security.
Daily Brief Summary
PAX Technology PoS terminals are vulnerable to high-severity threats that allow arbitrary code execution.
STM Cyber R&D team discovered the vulnerabilities by reverse engineering Android-based devices, highlighting six significant flaws.
Attackers could potentially gain root privileges, bypass sandboxing, and interfere with payment transactions.
To exploit certain vulnerabilities, attackers require either shell access or physical USB access to devices.
One of the disclosed flaws, CVE-2023-42133, has details withheld, while others are publicly listed.
PAX Technology was informed about the vulnerabilities in May 2023, with patches released in November 2023.
The vulnerabilities, if exploited, could lead to attackers modifying transaction amounts during payment processing.