First published: Tue Nov 21 2023(Updated: )
Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi was vulnerable to a Denial-of-Service attack allowing for an attacker to block access to the overlay configuration page in the web interface of the Axis device. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account however the impact is equal. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Credit: product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Axis Axis Os | <11.7.57 | |
Axis Axis Os 2022 | <10.12.213 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-21416 is a vulnerability found in the VAPIX API dynamicoverlay.cgi, allowing for a Denial-of-Service attack on the overlay configuration page in the web interface of Axis devices.
The severity of CVE-2023-21416 is high, with a CVSS score of 7.1.
The Axis OS and Axis OS 2022 software versions up to 11.7.57 and 10.12.213, respectively, are affected by CVE-2023-21416.
CVE-2023-21416 can be exploited by an attacker to block access to the overlay configuration page in the web interface of Axis devices through a Denial-of-Service attack.
To fix CVE-2023-21416, users should update their Axis OS or Axis OS 2022 software to versions higher than 11.7.57 and 10.12.213, respectively.