CVE-2023-21417

7.1 HIGH

📋 TL;DR

This CVE describes a path traversal vulnerability in Axis camera systems' VAPIX API manageoverlayimage.cgi endpoint that allows authenticated users with operator or administrator privileges to delete files and folders. The vulnerability affects Axis devices running vulnerable versions of AXIS OS. Exploitation requires authentication but can lead to unauthorized file deletion.

💻 Affected Systems

Products:
  • Axis network cameras and video encoders with VAPIX API
Versions: AXIS OS versions prior to the patched releases (specific versions in Axis advisory)
Operating Systems: AXIS OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with VAPIX API enabled (default on most Axis devices). Requires operator or administrator credentials.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator-level attackers could delete critical system files, potentially causing device malfunction, service disruption, or complete system compromise.

🟠

Likely Case

Authenticated attackers with operator or admin access deleting configuration files, overlay images, or other non-critical files to disrupt camera functionality.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users misusing their legitimate privileges.

🌐 Internet-Facing: MEDIUM - Axis cameras are often internet-facing, but exploitation requires authentication with privileged accounts.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials could exploit this vulnerability to disrupt surveillance systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but uses simple path traversal techniques. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Axis security advisory for specific patched AXIS OS versions

Vendor Advisory: https://www.axis.com/dam/public/2a/82/12/cve-2023-21417-en-US-417791.pdf

Restart Required: Yes

Instructions:

1. Download patched AXIS OS version from Axis website. 2. Upload firmware via web interface. 3. Reboot device after installation.

🔧 Temporary Workarounds

Restrict VAPIX API Access

all

Limit access to VAPIX API endpoints to trusted networks only

Configure firewall rules to restrict access to port 80/443 on Axis devices

Implement Strong Credential Policies

all

Enforce strong passwords, regular rotation, and limit privileged account usage

🧯 If You Can't Patch

  • Segment Axis cameras on isolated network VLANs
  • Implement strict access controls and monitor for suspicious file deletion attempts

🔍 How to Verify

Check if Vulnerable:

Check AXIS OS version via web interface: System > Support > System Overview

Check Version:

Via web interface or API: http://[device-ip]/axis-cgi/admin/param.cgi?action=list&group=Properties.Firmware

Verify Fix Applied:

Verify installed AXIS OS version matches or exceeds patched versions listed in Axis advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion events in system logs
  • Multiple failed authentication attempts followed by manageoverlayimage.cgi access

Network Indicators:

  • HTTP requests to manageoverlayimage.cgi with path traversal patterns (../ sequences)

SIEM Query:

source="axis-camera" AND uri="*manageoverlayimage.cgi*" AND (uri="*../*" OR status="200" AND method="POST")

🔗 References

📤 Share & Export