VAPIX API Remote Code Execution Vulnerability
CVE-2023-5677

8.8HIGH

Key Information:

Status
Vendor
CVE Published:
5 February 2024

What is CVE-2023-5677?

A vulnerability identified in the VAPIX API, specifically in the tcptest.cgi component, allows for inadequate input validation, which may lead to remote code execution. This vulnerability requires authentication with either an operator- or administrator-privileged service account for exploitation. The risk associated with exploiting this flaw is significantly lower when accessed with operator privileges compared to those with administrator privileges. Axis Communications has provided patched versions of AXIS OS to address this flaw, as detailed in their security advisory. Organizations using affected AXIS products should prioritize updating their systems to the latest versions to mitigate potential risks.

Affected Version(s)

AXIS OS AXIS OS 5.51

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.