Research & Development
$ #

CVE-2023-4818

Bootloader downgrade via improper tokenization

7.3 (High)

CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

POS terminal PAX A920

PayDroid 7.1.2_Aquarius_11.1.50_20230614 or lower

Adam Kliś, Hubert Jasudowicz and other members of STM Cyber R&D

In PAX A920, during boot, by switching to fastboot mode and flashing a partition named aboot:, it’s possible to downgrade the bootloader to a previously vulnerable, signed version (version check is skipped).
The attacker must have physical USB access to the device in order to exploit this vulnerability.

The vulnerability writeup with a PoC can be found on the blog post:
https://blog.stmcyber.com/pax-pos-cves-2023#CVE-2023-4818

  • 07-04-2023 - first contact with vendor briefly describing vulnerabilities (no reply)
  • 08-05-2023 - second attempt of contact with vendor (successful)
  • 10-05-2023 - sent technical details explaining all vulnerabilities (with PoC)
  • 01-08-2023 - contacted CERT.PL to assign CVEs (instant reply)
  • 09-10-2023 - further contact with PAX to fix found vulnerabilities
  • 30-11-2023 - STM Cyber verifies patches
  • 15-01-2024 - public release