First published: Fri May 30 2003(Updated: )
The web-based administration capability for various Axis Network Camera products allows remote attackers to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AXIS 2100 Network Camera | <=2.32 | |
Axis 2110 Network Camera | <=2.32 | |
Axis 2120 Network Camera | <=2.32 | |
AXIS 2130 PTZ Network Camera | <=2.32 | |
AXIS 2400 Video Server | <=2.32 | |
Axis 2401 Video Server | <=2.32 | |
AXIS 2420-IR Network Camera | <=2.32 | |
Axis 2460 Network DVR | <=3.00 | |
Axis 250s Video Server | <=3.02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0240 is a high-severity vulnerability that allows unauthorized remote access to configuration settings of affected Axis Network Camera products.
To mitigate CVE-2003-0240, it is recommended to update the firmware of the affected Axis Network Camera products to the latest version that addresses this vulnerability.
CVE-2003-0240 affects Axis 2100, 2110, 2120, 2130 PTZ Network Cameras, 2400, 2401 Video Servers, 2420-IR Network Camera, and 2460 Network DVR, among others, all with firmware versions up to 2.32.
The attack vector for CVE-2003-0240 is through crafted HTTP requests that exploit the web-based administration interface of affected devices.
Exploitation of CVE-2003-0240 allows an attacker to bypass security restrictions and potentially alter device configurations, leading to unauthorized access and control.