Vulnerability Description
Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control that can lead to remote privilege escalation. PAXSTORE marketplace endpoints allow an authenticated user to read and write data not owned by them, including third-party users, application and payment terminals, where an attacker can impersonate any user which may lead to the unauthorized disclosure, modification, or destruction of information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paxtechnology | Paxstore | <= 7.0.8_20200511171508 |
Related Weaknesses (CWE)
References
- https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ExploitThird Party Advisory
- https://marketing.paxtechnology.com/about-paxProduct
- https://www.whatspos.com/Product
- https://blog.pridesec.com.br/p/4c972078-5f01-419e-8bea-cf31ff2e3670/ExploitThird Party Advisory
- https://marketing.paxtechnology.com/about-paxProduct
- https://www.whatspos.com/Product
FAQ
What is CVE-2020-36126?
CVE-2020-36126 is a vulnerability with a CVSS score of 8.1 (HIGH). Pax Technology PAXSTORE v7.0.8_20200511171508 and lower is affected by incorrect access control that can lead to remote privilege escalation. PAXSTORE marketplace endpoints allow an authenticated user...
How severe is CVE-2020-36126?
CVE-2020-36126 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-36126?
Check the references section above for vendor advisories and patch information. Affected products include: Paxtechnology Paxstore.