First published: Tue Oct 05 2021(Updated: )
A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients.
Credit: product-security@axis.com product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Axis Axis Os | <10.8 | |
Axis Axis Os 2016 | <6.50.5.5 | |
Axis Axis Os 2018 | <8.40.4.3 | |
Axis Axis Os 2020 | <9.80.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31987 is a vulnerability related to SMTP test functionality on Axis Axis OS, allowing bypass of blocked network recipients.
CVE-2021-31987 has a severity rating of 7.5 (high).
CVE-2021-31987 affects Axis Axis OS versions up to and excluding 10.8, Axis Axis OS 2016 versions up to and excluding 6.50.5.5, Axis Axis OS 2018 versions up to and excluding 8.40.4.3, and Axis Axis OS 2020 versions up to and excluding 9.80.3.5.
To prevent the bypass of blocked network recipients, it is recommended to apply the necessary security patches provided by Axis.
You can find more information about CVE-2021-31987 at the following link: [CVE-2021-31987](https://www.axis.com/files/tech_notes/CVE-2021-31987.pdf).