Lucene search

K
cve[email protected]CVE-2023-21417
HistoryNov 21, 2023 - 7:15 a.m.

CVE-2023-21417

2023-11-2107:15:09
CWE-22
web.nvd.nist.gov
11
cve-2023-21417
path traversal attack
file deletion
vapix api
axis os
security advisory
patch

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.7%

Sandro Poppi, member of the AXIS OS Bug Bounty Program,

has found that the VAPIX API manageoverlayimage.cgi was vulnerable to path traversal attacks that allows for file/folder deletion. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

Affected configurations

NVD
Node
axisaxis_osRange<11.7.57active
OR
axisaxis_os_2020Range<9.80.49lts
OR
axisaxis_os_2022Range<10.12.208lts

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "AXIS OS",
    "vendor": "Axis Communications AB",
    "versions": [
      {
        "status": "affected",
        "version": "AXIS OS 8.50 – 11.6"
      }
    ]
  }
]

7.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.7%

Related for CVE-2023-21417