Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-5677


Brandon Rothel from QED Secure Solutions and Sam Hanson of Dragos have found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Please refer to the Axis security advisory for more information and solution.


Published

2024-02-05T06:15:46.690

Last Modified

2025-05-15T10:15:23.943

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.3 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-78
  • Type: Primary
    CWE-94

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System axis m3024-lve_firmware < 5.51.7.7 Yes
Hardware axis m3024-lve - No
Operating System axis m3025-ve_firmware < 5.51.7.7 Yes
Hardware axis m3025-ve - No
Operating System axis m7014_firmware < 5.51.7.7 Yes
Hardware axis m7014 - No
Operating System axis m7016_firmware < 5.51.7.7 Yes
Hardware axis m7016 - No
Operating System axis p1214-e_firmware < 5.51.7.7 Yes
Hardware axis p1214-e - No
Operating System axis p7214_firmware < 5.51.7.7 Yes
Hardware axis p7214 - No
Operating System axis p7216_firmware < 5.51.7.7 Yes
Hardware axis p7216 - No
Operating System axis q7401_firmware < 5.51.7.7 Yes
Hardware axis q7401 - No
Operating System axis q7404_firmware < 5.51.7.7 Yes
Hardware axis q7404 - No
Operating System axis q7414_firmware < 5.51.7.7 Yes
Hardware axis q7414 - No
Operating System axis q7424-r_mk_ii_firmware < 5.51.3.9 Yes
Hardware axis q7424-r_mk_ii - No

References