"PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions"

PAX Technology's Point-of-Sale (PoS) terminals are vulnerable to attacks due to a set of high-severity flaws that threat actors can exploit to execute arbitrary code. The STM Cyber R&D team, who reverse-engineered the company's Android-based devices, discovered half a dozen flaws that enable privilege escalation and local code execution from the bootloader. The successful exploitation of the discovered vulnerabilities could allow an attacker to elevate their privileges to root and evade sandboxing protections, granting them access to conduct any operation. This article continues to discuss the vulnerabilities impacting PoS terminals from PAX Technology.

THN reports "PAX PoS Terminal Flaw Could Allow Attackers to Tamper with Transactions"

Submitted by grigby1

Submitted by Gregory Rigby on