During internal Axis Security Development Model (ASDM) threat-modelling, a flaw was found in the protection for device tampering (commonly known as Secure Boot) in AXIS OS making it vulnerable to a sophisticated attack to bypass this protection. To Axis' knowledge, there are no known exploits of the vulnerability at this time. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
References
Link | Resource |
---|---|
https://www.axis.com/dam/public/0a/66/25/cve-2023-5553-en-US-417789.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Nov 2024, 09:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) During internal Axis Security Development Model (ASDM) threat-modelling, a flaw was found in the protection for device tampering (commonly known as Secure Boot) in AXIS OS making it vulnerable to a sophisticated attack to bypass this protection. To Axis' knowledge, there are no known exploits of the vulnerability at this time. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | |
CWE | CWE-863 |
29 Aug 2024, 21:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-693 |
04 Dec 2023, 15:03
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
First Time |
Axis
Axis axis Os Axis axis Os 2022 |
|
References | () https://www.axis.com/dam/public/0a/66/25/cve-2023-5553-en-US-417789.pdf - Vendor Advisory | |
CPE | cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:* cpe:2.3:o:axis:axis_os_2022:*:*:*:*:lts:*:*:* |
21 Nov 2023, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-21 07:15
Updated : 2024-11-08 09:15
NVD link : CVE-2023-5553
Mitre link : CVE-2023-5553
CVE.ORG link : CVE-2023-5553
JSON object : View
Products Affected
axis
- axis_os
- axis_os_2022
CWE