Логотип exploitDog
bind:CVE-2023-21418
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-21418

Количество 3

Количество 3

nvd логотип

CVE-2023-21418

около 2 лет назад

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API irissetup.cgi was vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVSS3: 7.1
EPSS: Низкий
github логотип

GHSA-wwjf-vpr8-3v33

около 2 лет назад

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API irissetup.cgi was vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVSS3: 7.1
EPSS: Низкий
fstec логотип

BDU:2023-08533

около 2 лет назад

Уязвимость реализации прикладного программного интерфейса VAPIX операционной системы AXIS OS, позволяющая нарушителю удалить произвольные файлы

CVSS3: 7.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-21418

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API irissetup.cgi was vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVSS3: 7.1
0%
Низкий
около 2 лет назад
github логотип
GHSA-wwjf-vpr8-3v33

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API irissetup.cgi was vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVSS3: 7.1
0%
Низкий
около 2 лет назад
fstec логотип
BDU:2023-08533

Уязвимость реализации прикладного программного интерфейса VAPIX операционной системы AXIS OS, позволяющая нарушителю удалить произвольные файлы

CVSS3: 7.1
0%
Низкий
около 2 лет назад

Уязвимостей на страницу