CVE-2022-26581

PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow an unauthorized attacker to perform privileged actions through the execution of specific binaries listed in ADB daemon. The attacker must have physical USB access to the device in order to exploit this vulnerability.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:paxtechnology:paydroid:7.1.1_virgo_v04.3.26t1_20210419:*:*:*:*:*:*:*
cpe:2.3:h:paxtechnology:a930:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:54

Type Values Removed Values Added
References () https://cyshield.com/e077d6c3-adff-49a1-afc3-71e10140f95c - Third Party Advisory () https://cyshield.com/e077d6c3-adff-49a1-afc3-71e10140f95c - Third Party Advisory
References () https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26581.md - () https://github.com/wr3nchsr/PAX-Paydroid-Advisories/blob/master/advisories/2022/CVEs/CVE-2022-26581.md -
References () https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ - () https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ -

23 Apr 2024, 14:15

Type Values Removed Values Added
Summary
  • (es) El dispositivo PAX A930 con PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 puede permitir que un atacante no autorizado realice acciones privilegiadas mediante la ejecución de archivos binarios específicos enumerados en el daemon ADB. El atacante debe tener acceso USB físico al dispositivo para poder aprovechar esta vulnerabilidad.
References
  • () https://wr3nchsr.github.io/pax-paydroid-vulnerabilities-advisory-2022/ -

Information

Published : 2022-12-16 22:15

Updated : 2024-11-21 06:54


NVD link : CVE-2022-26581

Mitre link : CVE-2022-26581

CVE.ORG link : CVE-2022-26581


JSON object : View

Products Affected

paxtechnology

  • paydroid
  • a930
CWE
CWE-862

Missing Authorization

NVD-CWE-Other