// For flags

CVE-2023-5677

Insufficient input validation in VAPIX API tcptext.cgi

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Brandon
Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi
did not have a sufficient input validation allowing for a possible remote code
execution. This flaw can only be exploited after authenticating with an
operator- or administrator-privileged service account. The impact of exploiting
this vulnerability is lower with operator-privileges compared to
administrator-privileges service accounts. Axis has released patched AXIS OS
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.

Brandon Rothel de QED Secure Solutions descubrió que la API VAPIX tcptest.cgi no tenía una validación de entrada suficiente que permitiera una posible ejecución remota de código. Esta falla solo puede explotarse después de autenticarse con una cuenta de servicio con privilegios de operador o administrador. El impacto de explotar esta vulnerabilidad es menor con privilegios de operador en comparación con cuentas de servicio con privilegios de administrador. Axis ha lanzado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener más información y soluciones.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-10-20 CVE Reserved
  • 2024-02-05 CVE Published
  • 2024-11-08 CVE Updated
  • 2024-11-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Axis
Search vendor "Axis"
M3024-lve Firmware
Search vendor "Axis" for product "M3024-lve Firmware"
< 5.51.7.7
Search vendor "Axis" for product "M3024-lve Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
M3024-lve
Search vendor "Axis" for product "M3024-lve"
--
Safe
Axis
Search vendor "Axis"
M3025-ve Firmware
Search vendor "Axis" for product "M3025-ve Firmware"
< 5.51.7.7
Search vendor "Axis" for product "M3025-ve Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
M3025-ve
Search vendor "Axis" for product "M3025-ve"
--
Safe
Axis
Search vendor "Axis"
M7014 Firmware
Search vendor "Axis" for product "M7014 Firmware"
< 5.51.7.7
Search vendor "Axis" for product "M7014 Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
M7014
Search vendor "Axis" for product "M7014"
--
Safe
Axis
Search vendor "Axis"
M7016 Firmware
Search vendor "Axis" for product "M7016 Firmware"
< 5.51.7.7
Search vendor "Axis" for product "M7016 Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
M7016
Search vendor "Axis" for product "M7016"
--
Safe
Axis
Search vendor "Axis"
P1214-e Firmware
Search vendor "Axis" for product "P1214-e Firmware"
< 5.51.7.7
Search vendor "Axis" for product "P1214-e Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
P1214-e
Search vendor "Axis" for product "P1214-e"
--
Safe
Axis
Search vendor "Axis"
P7214 Firmware
Search vendor "Axis" for product "P7214 Firmware"
< 5.51.7.7
Search vendor "Axis" for product "P7214 Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
P7214
Search vendor "Axis" for product "P7214"
--
Safe
Axis
Search vendor "Axis"
P7216 Firmware
Search vendor "Axis" for product "P7216 Firmware"
< 5.51.7.7
Search vendor "Axis" for product "P7216 Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
P7216
Search vendor "Axis" for product "P7216"
--
Safe
Axis
Search vendor "Axis"
Q7401 Firmware
Search vendor "Axis" for product "Q7401 Firmware"
< 5.51.7.7
Search vendor "Axis" for product "Q7401 Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
Q7401
Search vendor "Axis" for product "Q7401"
--
Safe
Axis
Search vendor "Axis"
Q7404 Firmware
Search vendor "Axis" for product "Q7404 Firmware"
< 5.51.7.7
Search vendor "Axis" for product "Q7404 Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
Q7404
Search vendor "Axis" for product "Q7404"
--
Safe
Axis
Search vendor "Axis"
Q7414 Firmware
Search vendor "Axis" for product "Q7414 Firmware"
< 5.51.7.7
Search vendor "Axis" for product "Q7414 Firmware" and version " < 5.51.7.7"
-
Affected
in Axis
Search vendor "Axis"
Q7414
Search vendor "Axis" for product "Q7414"
--
Safe
Axis
Search vendor "Axis"
Q7424-r Mk Ii Firmware
Search vendor "Axis" for product "Q7424-r Mk Ii Firmware"
< 5.51.3.9
Search vendor "Axis" for product "Q7424-r Mk Ii Firmware" and version " < 5.51.3.9"
-
Affected
in Axis
Search vendor "Axis"
Q7424-r Mk Ii
Search vendor "Axis" for product "Q7424-r Mk Ii"
--
Safe