Lucene search

K
cve[email protected]CVE-2023-5800
HistoryFeb 05, 2024 - 6:15 a.m.

CVE-2023-5800

2024-02-0506:15:46
CWE-94
web.nvd.nist.gov
11
vintage
axis os
bug bounty program
vapix
api
remote code execution
input validation
security advisory

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.9%

Vintage,
member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi
did not have a sufficient input validation allowing for a possible remote code
execution. This flaw can only be exploited after authenticating with an
operator- or administrator-privileged service account. Axis has released patched AXIS OS
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.

Affected configurations

NVD
Node
axisaxis_osRange<11.8.61active
Node
axisaxis_os_2020Range<9.80.55lts
OR
axisaxis_os_2022Range<10.12.220lts
CPENameOperatorVersion
axis:axis_osaxis axis oslt11.8.61

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "AXIS OS",
    "vendor": "Axis Communications AB",
    "versions": [
      {
        "status": "affected",
        "version": "AXIS OS 11.8, 10.12, 9.80, 8.40, 6.50"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.9%

Related for CVE-2023-5800