VAPIX API Remote Code Execution Vulnerability
CVE-2023-5677

6.3MEDIUM

Key Information:

Status
Vendor
CVE Published:
5 February 2024

What is CVE-2023-5677?

A vulnerability identified in the VAPIX API, specifically in the tcptest.cgi component, allows for inadequate input validation, which may lead to remote code execution. This vulnerability requires authentication with either an operator- or administrator-privileged service account for exploitation. The risk associated with exploiting this flaw is significantly lower when accessed with operator privileges compared to those with administrator privileges. Axis Communications has provided patched versions of AXIS OS to address this flaw, as detailed in their security advisory. Organizations using affected AXIS products should prioritize updating their systems to the latest versions to mitigate potential risks.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

AXIS OS AXIS OS 5.51

AXIS OS AXIS OS 6.50

References

CVSS V3.1

Score:
6.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.