We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-21405

Denial-of-Service vulnerability in Axis Network Door Controller's and Axis Network Intercom's OSDP communication



Description

Knud from Fraktal.fi has found a flaw in some Axis Network Door Controllers and Axis Network Intercoms when communicating over OSDP, highlighting that the OSDP message parser crashes the pacsiod process, causing a temporary unavailability of the door-controlling functionalities meaning that doors cannot be opened or closed. No sensitive or customer data can be extracted as the Axis device is not further compromised. Please refer to the Axis security advisory for more information, mitigation and affected products and software versions.

Reserved 2022-11-04 | Published 2023-07-25 | Updated 2024-11-08 | Assigner Axis


MEDIUM: 6.5CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-1286: Improper Validation of Syntactic Correctness of Input

Product status

Default status
unaffected

AXIS OS 1.65.4 or earlier
affected

Default status
unaffected

AXIS OS 11.0 - 11.6.16.0
affected

Default status
unaffected

AXIS OS 1.84.4 or earlier
affected

AXIS OS 10.12.171.0 or earlier
affected

AXIS OS 11.0 - 11.6.16.0
affected

Default status
unaffected

AXIS OS 10.12.171.0 or earlier
affected

AXIS OS 11.0 - 11.6.16.0
affected

Default status
unaffected

AXIS OS 10.12.178 or earlier
affected

AXIS OS AXIS OS 11.0 - 11.5.53
affected

Default status
unaffected

AXIS OS 10.12.178 or earlier
affected

AXIS OS AXIS OS 11.0 - 11.5.53
affected

References

www.axis.com/...lic/7f/3a/ed/cve-2023-21405-en-US-407244.pdf

cve.org (CVE-2023-21405)

nvd.nist.gov (CVE-2023-21405)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2023-21405

Support options

Helpdesk Chat, Email, Knowledgebase