Page 4 of 66 results (0.001 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Due to insufficient file permissions, unprivileged users could gain access to unencrypted user credentials that are used in the integration interface towards 3rd party systems. • https://www.axis.com/dam/public/0b/1c/96/cve-2023-2140712-en-US-409778.pdf • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

A broken access control was found allowing for privileged escalation of the operator account to gain administrator privileges. • https://www.axis.com/dam/public/0b/1c/96/cve-2023-2140712-en-US-409778.pdf •

CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 0

Ariel Harush and Roy Hodir from OTORIO have found a flaw in the AXIS A1001 when communicating over OSDP. A heap-based buffer overflow was found in the pacsiod process which is handling the OSDP communication allowing to write outside of the allocated buffer. By appending invalid data to an OSDP message it was possible to write data beyond the heap allocated buffer. The data written outside the buffer could be used to execute arbitrary code.  lease refer to the Axis security advisory for more information, mitigation and affected products and software versions. • https://www.axis.com/dam/public/1b/21/5f/cve-2023-21406-en-US-407245.pdf • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-122: Heap-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 6.5EPSS: 0%CPEs: 17EXPL: 0

Knud from Fraktal.fi has found a flaw in some Axis Network Door Controllers and Axis Network Intercoms when communicating over OSDP, highlighting that the OSDP message parser crashes the pacsiod process, causing a temporary unavailability of the door-controlling functionalities meaning that doors cannot be opened or closed. No sensitive or customer data can be extracted as the Axis device is not further compromised. Please refer to the Axis security advisory for more information, mitigation and affected products and software versions. • https://www.axis.com/dam/public/7f/3a/ed/cve-2023-21405-en-US-407244.pdf • CWE-754: Improper Check for Unusual or Exceptional Conditions CWE-1286: Improper Validation of Syntactic Correctness of Input •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

AXIS OS 11.0.X - 11.3.x use a static RSA key in legacy LUA-components to protect Axis-specific source code. The static RSA key is not used in any other secure communication nor can it be used to compromise the device or any customer data. • https://www.axis.com/dam/public/07/0a/20/cve-2023-21404-en-US-398426.pdf • CWE-311: Missing Encryption of Sensitive Data CWE-321: Use of Hard-coded Cryptographic Key •