Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi was vulnerable to a Denial-of-Service attack allowing for an attacker to block access to the overlay configuration page in the web interface of the Axis device. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account however the impact is equal. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
References
Link | Resource |
---|---|
https://www.axis.com/dam/public/35/2a/a6/cve-2023-21416-en-US-417790.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Nov 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi was vulnerable to a Denial-of-Service attack allowing for an attacker to block access to the overlay configuration page in the web interface of the Axis device. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account however the impact is equal. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | |
CWE | CWE-35 |
28 Nov 2023, 21:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.axis.com/dam/public/35/2a/a6/cve-2023-21416-en-US-417790.pdf - Vendor Advisory | |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:* cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:* |
|
First Time |
Axis
Axis axis Os Axis axis Os 2022 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
21 Nov 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-21 07:15
Updated : 2024-11-08 09:15
NVD link : CVE-2023-21416
Mitre link : CVE-2023-21416
CVE.ORG link : CVE-2023-21416
JSON object : View
Products Affected
axis
- axis_os
- axis_os_2022
CWE