Vulnerability identifier: #VU13388
Vulnerability risk: Low
CVSSv3.1: 4.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Axis Communications video cameras
Hardware solutions /
Firmware
Vendor: Axis Communications
Description
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to the ‘return_page’ and ‘servermanager_return_page’ query-string parameters in /bin/ssid’s .srv functionality are controlled by the user, and returned back to her in the response to the user’s request.. A remote attacker can make the calculated content-length larger than the actual data buffer, and as a result – extra bytes from memory are leaked in the response.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Axis Communications video cameras: All versions
External links
http://blog.vdoo.com/2018/06/18/vdoo-discovers-significant-vulnerabilities-in-axis-cameras/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.