CVE-2023-5677

Brandon Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:axis:q7414_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7414:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*

History

08 Nov 2024, 09:15

Type Values Removed Values Added
CWE CWE-78
Summary (en) Brandon Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. (en) Brandon Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

13 Feb 2024, 00:38

Type Values Removed Values Added
CWE CWE-94
First Time Axis m3025-ve
Axis p7216
Axis p1214-e Firmware
Axis m7016 Firmware
Axis m3025-ve Firmware
Axis p7214 Firmware
Axis m3024-lve Firmware
Axis q7401
Axis p1214-e
Axis q7404 Firmware
Axis q7404
Axis m7014 Firmware
Axis
Axis q7414 Firmware
Axis p7216 Firmware
Axis m3024-lve
Axis q7401 Firmware
Axis q7424-r Mk Ii
Axis q7424-r Mk Ii Firmware
Axis m7016
Axis q7414
Axis m7014
Axis p7214
References () https://www.axis.com/dam/public/a9/dd/f1/cve-2023-5677-en-US-424335.pdf - () https://www.axis.com/dam/public/a9/dd/f1/cve-2023-5677-en-US-424335.pdf - Vendor Advisory
CVSS v2 : unknown
v3 : 6.3
v2 : unknown
v3 : 8.8
CPE cpe:2.3:o:axis:q7404_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:p7216:-:*:*:*:*:*:*:*
cpe:2.3:h:axis:m3025-ve:-:*:*:*:*:*:*:*
cpe:2.3:h:axis:m7016:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:m3024-lve_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:axis:p1214-e_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7404:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:m7014_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:m7014:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:m7016_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:m3024-lve:-:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7401:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:m3025-ve_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:axis:q7424-r_mk_ii_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:axis:q7401_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7424-r_mk_ii:-:*:*:*:*:*:*:*
cpe:2.3:o:axis:q7414_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:axis:p7214_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:axis:p7216_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:axis:q7414:-:*:*:*:*:*:*:*
cpe:2.3:h:axis:p7214:-:*:*:*:*:*:*:*
cpe:2.3:h:axis:p1214-e:-:*:*:*:*:*:*:*

05 Feb 2024, 13:54

Type Values Removed Values Added
Summary
  • (es) Brandon Rothel de QED Secure Solutions descubrió que la API VAPIX tcptest.cgi no tenía una validación de entrada suficiente que permitiera una posible ejecución remota de código. Esta falla solo puede explotarse después de autenticarse con una cuenta de servicio con privilegios de operador o administrador. El impacto de explotar esta vulnerabilidad es menor con privilegios de operador en comparación con cuentas de servicio con privilegios de administrador. Axis ha lanzado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener más información y soluciones.

05 Feb 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-05 06:15

Updated : 2024-11-08 09:15


NVD link : CVE-2023-5677

Mitre link : CVE-2023-5677

CVE.ORG link : CVE-2023-5677


JSON object : View

Products Affected

axis

  • m7014
  • m7014_firmware
  • p7216
  • q7404_firmware
  • p1214-e
  • p7214_firmware
  • p7216_firmware
  • p1214-e_firmware
  • m3024-lve_firmware
  • q7424-r_mk_ii_firmware
  • m3025-ve_firmware
  • m7016
  • p7214
  • q7414
  • q7424-r_mk_ii
  • q7401_firmware
  • m3024-lve
  • q7414_firmware
  • m3025-ve
  • q7404
  • q7401
  • m7016_firmware
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')