{"vuid":"VU#799060","idnumber":"799060","name":"Various Axis products allow unauthorized remote privileged access","keywords":["Axis Network Camera","administrative functions","HTTP request","// characters","root access"],"overview":"A vulnerability in various Axis Communications products may allow unauthorized remote privileged access.","clean_desc":"Axis Communications Inc. produces network-enabled cameras and video servers. The company describes itself as \"an innovative market leader in network video and print servers. Axis' products and solutions are focused on applications such as security surveillance, remote monitoring and document management.\"\nA crafted URL sent to an affected device may allow a remote attacker to take a number of privileged actions, essentially gaining superuser access. For further details, please see the Core Security Technologies Advisory.","impact":"Quoting from the Core Security Technologies Advisory: Using this vulnerability, an attacker can reset the root password, then enable the telnet server by modifying configuration files, giving the attacker interactive access to a Unix like command line, allowing her to execute arbitrary commands as root.","resolution":"Apply a vendor-supplied firmware upgrade.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Juliano Rizzo of Core Security Technologies.","author":"This document was written by Ian A Finlay.","public":["http://www.coresecurity.com/common/showdoc.php?idx=329&idxseccion=10","http://securitytracker.com/alerts/2003/May/1006854.html","http://www.iss.net/security_center/static/12104.php","http://www.secunia.com/advisories/8876/","http://www.securityfocus.com/bid/7652","http://www.axis.com/us/aboutus.asp","http://www.axis.com/"],"cveids":["CVE-2003-0240"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-05-23T17:12:14Z","publicdate":"2003-05-27T00:00:00Z","datefirstpublished":"2003-06-05T14:40:52Z","dateupdated":"2003-06-05T15:10:39Z","revision":20,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"5","cam_impact":"20","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"15","cam_scorecurrentwidelyknown":"15","cam_scorecurrentwidelyknownexploited":"30","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":15.0,"vulnote":null}