Lucene search

K
nvd[email protected]NVD:CVE-2023-5800
HistoryFeb 05, 2024 - 6:15 a.m.

CVE-2023-5800

2024-02-0506:15:46
CWE-94
web.nvd.nist.gov
7
cve-2023-5800
input validation
remote code execution
axis os
security advisory
solution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

21.8%

Vintage,
member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi
did not have a sufficient input validation allowing for a possible remote code
execution. This flaw can only be exploited after authenticating with an
operator- or administrator-privileged service account. Axis has released patched AXIS OS
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.

Affected configurations

Nvd
Node
axisaxis_osRange<11.8.61active
Node
axisaxis_os_2020Range<9.80.55lts
OR
axisaxis_os_2022Range<10.12.220lts
VendorProductVersionCPE
axisaxis_os*cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*
axisaxis_os_2020*cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:*
axisaxis_os_2022*cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:*

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

6.4

Confidence

High

EPSS

0.001

Percentile

21.8%

Related for NVD:CVE-2023-5800