Axis Os 2020 Axis Os 2020

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Axis Os 2020.

By the Year

In 2026 there have been 0 vulnerabilities in Axis Os 2020. Axis Os 2020 did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 1 8.80
2023 3 7.43
2022 0 0.00
2021 3 7.70

It may take a day or so for new Axis Os 2020 vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Axis Os 2020 Security Vulnerabilities

Axis OS VAPIX create_overlay.cgi RCE via insufficient input validation
CVE-2023-5800 8.8 - High - February 05, 2024

Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

Code Injection

AXIS OS VAPIX irissetup.cgi Path Traversal Deletion
CVE-2023-21418 7.1 - High - November 21, 2023

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API irissetup.cgi was vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

Directory traversal

Axis VAPIX manageoverlayimage.cgi Path Traversal Enables Deletion
CVE-2023-21417 7.1 - High - November 21, 2023

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API manageoverlayimage.cgi was vulnerable to path traversal attacks that allows for file/folder deletion. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

Directory traversal

AXIS OS VAPIX overlay_del.cgi Path Traversal File Deletion
CVE-2023-21415 8.1 - High - October 16, 2023

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

Directory traversal

User controlled parameters related to SMTP notifications are not correctly validated
CVE-2021-31986 6.8 - Medium - October 05, 2021

User controlled parameters related to SMTP notifications are not correctly validated. This can lead to a buffer overflow resulting in crashes and data leakage.

Memory Corruption

A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email.
CVE-2021-31988 8.8 - High - October 05, 2021

A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email.

Injection

A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients.
CVE-2021-31987 7.5 - High - October 05, 2021

A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Axis Os 2020 or by Axis? Click the Watch button to subscribe.

Axis
Vendor

Axis Os 2020
Product

subscribe