Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: Axis

Published: 2024-02-05T05:20:38.668Z

Updated: 2024-02-05T05:20:38.668Z

Reserved: 2023-10-26T10:41:05.983Z


Link: CVE-2023-5800

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2024-02-05T06:15:46.863

Modified: 2024-02-13T00:37:47.070


Link: CVE-2023-5800

JSON object: View

cve-icon Redhat Information

No data.

CWE