Description
An attacker with physical access to a PAX Point Of Sale device with ProlinOS through 2.4.161.8859R can boot it in management mode, enable the XCB service, and then list, read, create, and overwrite files with MAINAPP permissions.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-20534 | An attacker with physical access to a PAX Point Of Sale device with ProlinOS through 2.4.161.8859R can boot it in management mode, enable the XCB service, and then list, read, create, and overwrite files with MAINAPP permissions. |
References
| Link | Providers |
|---|---|
| https://git.lsd.cat/g/pax-pwn |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:33:56.910Z
Reserved: 2020-11-01T00:00:00.000Z
Link: CVE-2020-28044
No data.
Status : Modified
Published: 2020-11-02T21:15:31.460
Modified: 2024-11-21T05:22:16.257
Link: CVE-2020-28044
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD