First published: Tue Nov 21 2023(Updated: )
Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API irissetup.cgi was vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Credit: product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Axis Axis Os | <6.50.5.15 | |
Axis Axis Os | <11.7.57 | |
Axis Axis Os 2018 | <8.40.35 | |
Axis Axis Os 2020 | <9.80.49 | |
Axis Axis Os 2022 | <10.12.213 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-21418 is high.
CVE-2023-21418 allows for file deletion through path traversal attacks, but exploitation requires authentication with an operator or administrator account.
Axis Axis Os versions up to 6.50.5.15, 11.7.57, 8.40.35, 9.80.49, and 10.12.213 are affected by CVE-2023-21418.
Apply the latest security patch or update provided by Axis to fix CVE-2023-21418.
You can find more information about CVE-2023-21418 in the official Axis advisory document at: [https://www.axis.com/dam/public/49/93/55/cve-2023-21418-en-US-417792.pdf]