Lucene search

K
cve[email protected]CVE-2023-21414
HistoryOct 16, 2023 - 7:15 a.m.

CVE-2023-21414

2023-10-1607:15:08
web.nvd.nist.gov
13
ncc group
axis communications
secure boot
device tampering
penetration test
vulnerability
cve-2023-21414
nvd
axis security advisory

7.1 High

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.6%

NCC Group has found a flaw during the annual internal penetration test ordered by Axis Communications. The protection for device tampering (commonly known as Secure Boot) contains a flaw which provides an opportunity for a sophisticated attack to bypass this protection. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

Affected configurations

NVD
Node
axisaxis_osRange10.11.5510.12.206
OR
axisaxis_osRange11.0.8911.6.94active
AND
axism3215Match-
OR
axism3216Match-
OR
axism4317-plveMatch-
OR
axism4318-plveMatch-
OR
axism4327-pMatch-
OR
axism4328-pMatch-
OR
axisp1467-leMatch-
OR
axisp1468-leMatch-
OR
axisp1468-xleMatch-
OR
axisp3265-lvMatch-
OR
axisp3265-lveMatch-
OR
axisp3265-vMatch-
OR
axisp3267-lvMatch-
OR
axisp3267-lveMatch-
OR
axisp3268-lvMatch-
OR
axisp3268-lveMatch-
OR
axisp3827-pveMatch-
OR
axisp4705-plveMatch-
OR
axisp4707-plveMatch-
OR
axisq1656Match-
OR
axisq1656-bMatch-
OR
axisq1656-beMatch-
OR
axisq1656-bleMatch-
OR
axisq1656-dleMatch-
OR
axisq1656-leMatch-
OR
axisq1961-teMatch-
OR
axisq2101-teMatch-
OR
axisq3536-lveMatch-
OR
axisq3538-lveMatch-
OR
axisq3626-veMatch-
OR
axisq3628-veMatch-
OR
axisxfq1656Match-
Node
axisaxis_osRange<11.6.94active
AND
axisa8207-ve_mk_iiMatch-
Node
axisaxis_osRange10.11.5510.12.206
OR
axisaxis_osRange11.0.8911.6.94active
AND
axisq3527-lveMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "ARTPEC 8"
    ],
    "product": "AXIS OS",
    "vendor": "Axis Communications AB",
    "versions": [
      {
        "status": "affected",
        "version": "AXIS OS 10.11 - 11.5"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "AXIS A8207-VE Mk II",
    "vendor": "Axis Communications AB",
    "versions": [
      {
        "status": "affected",
        "version": "AXIS OS 11.5 or earlier"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "AXIS Q3527-LVE",
    "vendor": "Axis Communications AB",
    "versions": [
      {
        "status": "affected",
        "version": "AXIS OS 10.11 - 11.5"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

6.5 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

51.6%

Related for CVE-2023-21414