Vulnerability identifier: #VU13387
Vulnerability risk: Low
CVSSv3.1: 6.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Axis Communications video cameras
Hardware solutions /
Firmware
Vendor: Axis Communications
Description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to insufficient validation of user-supplied input. A remote attacker can issue an HTTP request to a .cgi script URL, with a PATH_INFO that ends with the .srv extension, crash the httpd process and cause (at least) a black screen for viewers that were already logged to the camera using the web interface with default settings.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Axis Communications video cameras: All versions
External links
http://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.