First published: Tue Oct 05 2021(Updated: )
User controlled parameters related to SMTP notifications are not correctly validated. This can lead to a buffer overflow resulting in crashes and data leakage.
Credit: product-security@axis.com product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Axis Axis Os | <10.7 | |
Axis Axis Os 2016 | <6.50.5.5 | |
Axis Axis Os 2018 | <8.40.4.3 | |
Axis Axis Os 2020 | <9.80.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31986 is a vulnerability in Axis Axis Os, versions up to 10.7, Axis Axis Os 2016, versions up to 6.50.5.5, Axis Axis Os 2018, versions up to 8.40.4.3, and Axis Axis Os 2020, versions up to 9.80.3.5, where user controlled parameters related to SMTP notifications are not correctly validated, leading to a buffer overflow resulting in crashes and data leakage.
CVE-2021-31986 has a severity rating of 6.8, which is considered medium.
CVE-2021-31986 affects Axis Axis Os, versions up to 10.7, Axis Axis Os 2016, versions up to 6.50.5.5, Axis Axis Os 2018, versions up to 8.40.4.3, and Axis Axis Os 2020, versions up to 9.80.3.5.
CVE-2021-31986 has two Common Weakness Enumeration (CWE) IDs: CWE-119 and CWE-787.
CVE-2021-31986 can be exploited by providing user controlled parameters related to SMTP notifications that are not correctly validated, which can lead to a buffer overflow, resulting in crashes and data leakage.