paxtechnology CVE Vulnerabilities & Metrics

Focus on paxtechnology vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About paxtechnology Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with paxtechnology. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total paxtechnology CVEs: 13
Earliest CVE date: 07 May 2021, 11:15 UTC
Latest CVE date: 15 Jan 2024, 14:15 UTC

Latest CVE reference: CVE-2023-4818

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical paxtechnology CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.95

Max CVSS: 6.4

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 8
4.0-6.9 5
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS paxtechnology CVEs

These are the five CVEs with the highest CVSS scores for paxtechnology, sorted by severity first and recency.

All CVEs for paxtechnology

CVE-2023-4818 paxtechnology vulnerability CVSS: 0 15 Jan 2024, 14:15 UTC

PAX A920 device allows to downgrade bootloader due to a bug in its version check. The signature is correctly checked and only bootloader signed by PAX can be used.  The attacker must have physical USB access to the device in order to exploit this vulnerability.

CVE-2023-27199 paxtechnology vulnerability CVSS: 0 05 Jul 2023, 20:15 UTC

PAX Technology A930 PayDroid_7.1.1_Virgo_V04.5.02_20220722 allows attackers to compile a malicious shared library and use LD_PRELOAD to bypass authorization checks.

CVE-2023-27198 paxtechnology vulnerability CVSS: 0 05 Jul 2023, 20:15 UTC

PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can allow the execution of arbitrary commands by using the exec service and including a specific word in the command to be executed. The attacker must have physical USB access to the device in order to exploit this vulnerability.

CVE-2023-27197 paxtechnology vulnerability CVSS: 0 05 Jul 2023, 20:15 UTC

PAX A930 device with PayDroid_7.1.1_Virgo_V04.5.02_20220722 can allow an attacker to gain root access by running a crafted binary leveraging an exported function from a shared library. The attacker must have shell access to the device in order to exploit this vulnerability.

CVE-2022-26582 paxtechnology vulnerability CVSS: 0 16 Dec 2022, 22:15 UTC

PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow an attacker to gain root access through command injection in systool client. The attacker must have shell access to the device in order to exploit this vulnerability.

CVE-2022-26581 paxtechnology vulnerability CVSS: 0 16 Dec 2022, 22:15 UTC

PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow an unauthorized attacker to perform privileged actions through the execution of specific binaries listed in ADB daemon. The attacker must have physical USB access to the device in order to exploit this vulnerability.

CVE-2022-26580 paxtechnology vulnerability CVSS: 0 16 Dec 2022, 22:15 UTC

PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow the execution of specific command injections on selected binaries in the ADB daemon shell service. The attacker must have physical USB access to the device in order to exploit this vulnerability.

CVE-2022-26579 paxtechnology vulnerability CVSS: 0 16 Dec 2022, 22:15 UTC

PAX A930 device with PayDroid_7.1.1_Virgo_V04.3.26T1_20210419 can allow a root privileged attacker to install unsigned packages. The attacker must have shell access to the device and gain root privileges in order to exploit this vulnerability.

CVE-2020-36128 paxtechnology vulnerability CVSS: 6.4 07 May 2021, 11:15 UTC

Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by a token spoofing vulnerability. Each payment terminal has a session token (called X-Terminal-Token) to access the marketplace. This allows the store to identify the terminal and make available the applications distributed by its reseller. By intercepting HTTPS traffic from the application store, it is possible to collect the request responsible for assigning the X-Terminal-Token to the terminal, which makes it possible to craft an X-Terminal-Token pretending to be another device. An attacker can use this behavior to authenticate its own payment terminal in the application store through token impersonation.

CVE-2020-36127 paxtechnology vulnerability CVSS: 4.0 07 May 2021, 11:15 UTC

Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by an information disclosure vulnerability. Through the PUK signature functionality, an administrator will not have access to the current p12 certificate and password. When accessing this functionality, the administrator has the option to replace the current certificate and it is not possible to view the certificate password (p12) already deployed on the platform. The replacement p12 certificate returns to users in base64 with its password, which can be accessed by non-administrator users.

CVE-2020-36126 paxtechnology vulnerability CVSS: 5.5 07 May 2021, 11:15 UTC

Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control that can lead to remote privilege escalation. PAXSTORE marketplace endpoints allow an authenticated user to read and write data not owned by them, including third-party users, application and payment terminals, where an attacker can impersonate any user which may lead to the unauthorized disclosure, modification, or destruction of information.

CVE-2020-36125 paxtechnology vulnerability CVSS: 5.5 07 May 2021, 11:15 UTC

Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control where password revalidation in sensitive operations can be bypassed remotely by an authenticated attacker through requesting the endpoint directly.

CVE-2020-36124 paxtechnology vulnerability CVSS: 4.0 07 May 2021, 11:15 UTC

Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by XML External Entity (XXE) injection. An authenticated attacker can compromise the private keys of a JWT token and reuse them to manipulate the access tokens to access the platform as any desired user (clients and administrators).