Brandon Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Axis

Published: 2024-02-05T05:20:24.483Z

Updated: 2024-08-02T08:07:32.550Z

Reserved: 2023-10-20T07:48:06.861Z

Link: CVE-2023-5677

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2024-02-05T06:15:46.690

Modified: 2024-02-13T00:38:00.893

Link: CVE-2023-5677

cve-icon Redhat

No data.