Axis Communication A1001 Heap-Based Buffer Overflow (CVE-2023-21406)

high Tenable OT Security Plugin ID 501934


The remote OT asset is affected by a vulnerability.


Ariel Harush and Roy Hodir from OTORIO have found a flaw in the AXIS A1001 when communicating over OSDP. A heap-based buffer overflow was found in the pacsiod process which is handling the OSDP communication allowing to write outside of the allocated buffer. By appending invalid data to an OSDP message it was possible to write data beyond the heap allocated buffer. The data written outside the buffer could be used to execute arbitrary code. lease refer to the Axis security advisory for more information, mitigation and affected products and software versions.

This plugin only works with Tenable.ot.
Please visit for more information.


Refer to the vendor advisory.

See Also

Plugin Details

Severity: High

ID: 501934

Version: 1.3

Type: remote

Family: Tenable.ot

Published: 1/23/2024

Updated: 2/15/2024

Supported Sensors: Tenable OT Security

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 8.3

Temporal Score: 6.1

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-21406


Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:axis:a1001_firmware

Required KB Items: Tenable.ot/AxisCommunication

Exploit Ease: No known exploits are available

Patch Publication Date: 7/25/2023

Vulnerability Publication Date: 7/25/2023

Reference Information

CVE: CVE-2023-21406

CWE: 787