CVE-2023-5677
05.02.2024, 06:15
Brandon Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Please refer to the Axis security advisory for more information and solution.
Vendor | Product | Version |
---|---|---|
axis | m3024-lve_firmware | 𝑥 < 5.51.7.7 |
axis | m3025-ve_firmware | 𝑥 < 5.51.7.7 |
axis | m7014_firmware | 𝑥 < 5.51.7.7 |
axis | m7016_firmware | 𝑥 < 5.51.7.7 |
axis | p1214-e_firmware | 𝑥 < 5.51.7.7 |
axis | p7214_firmware | 𝑥 < 5.51.7.7 |
axis | p7216_firmware | 𝑥 < 5.51.7.7 |
axis | q7401_firmware | 𝑥 < 5.51.7.7 |
axis | q7404_firmware | 𝑥 < 5.51.7.7 |
axis | q7414_firmware | 𝑥 < 5.51.7.7 |
axis | q7424-r_mk_ii_firmware | 𝑥 < 5.51.3.9 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
- CWE-94 - Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.