Axis Communication Network Cameras and Video Servers Arbitrary OS Commands Execution (CVE-2004-2425)

high Tenable OT Security Plugin ID 502706

Synopsis

The remote OT asset is affected by a vulnerability.

Description

Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to execute arbitrary commands via accent (`) and possibly other shell metacharacters in the query string to virtualinput.cgi.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://www.nessus.org/u?11b154e8

http://www.nessus.org/u?a7f67a8b

http://secunia.com/advisories/12353

http://securitytracker.com/id?1011056

http://www.osvdb.org/9121

http://www.securityfocus.com/bid/11011

https://exchange.xforce.ibmcloud.com/vulnerabilities/17076

Plugin Details

Severity: High

ID: 502706

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 11/29/2024

Updated: 12/2/2024

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2004-2425

Vulnerability Information

CPE: cpe:/h:axis:230_mpeg2_video_server:3.11

Required KB Items: Tenable.ot/AxisCommunication

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/31/2004

Vulnerability Publication Date: 12/31/2004

Reference Information

CVE: CVE-2004-2425