CVE-2023-21413

GoSecure on behalf of Genetec Inc. has found a flaw that allows for a remote code execution during the installation of ACAP applications on the Axis device. The application handling service in AXIS OS was vulnerable to command injection allowing an attacker to run arbitrary code. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:axis:axis_os:*:*:*:*:lts:*:*:*
cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*

History

20 Oct 2023, 18:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*
cpe:2.3:o:axis:axis_os:*:*:*:*:lts:*:*:*
References (MISC) https://www.axis.com/dam/public/ad/ff/83/cve-2023-21413pdf-en-US-412755.pdf - (MISC) https://www.axis.com/dam/public/ad/ff/83/cve-2023-21413pdf-en-US-412755.pdf - Vendor Advisory
CWE CWE-77
First Time Axis
Axis axis Os

16 Oct 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-16 07:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-21413

Mitre link : CVE-2023-21413

CVE.ORG link : CVE-2023-21413


JSON object : View

Products Affected

axis

  • axis_os
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')