axis CVE Vulnerabilities & Metrics

Focus on axis vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About axis Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with axis. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total axis CVEs: 41
Earliest CVE date: 07 Feb 2000, 05:00 UTC
Latest CVE date: 05 Feb 2024, 06:15 UTC

Latest CVE reference: CVE-2023-5800

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical axis CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.6

Max CVSS: 10.0

Critical CVEs (≥9): 12

CVSS Range vs. Count

Range Count
0.0-3.9 21
4.0-6.9 22
7.0-8.9 7
9.0-10.0 12

CVSS Distribution Chart

Top 5 Highest CVSS axis CVEs

These are the five CVEs with the highest CVSS scores for axis, sorted by severity first and recency.

All CVEs for axis

CVE-2023-5800 axis vulnerability CVSS: 0 05 Feb 2024, 06:15 UTC

Vintage, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVE-2023-5677 axis vulnerability CVSS: 0 05 Feb 2024, 06:15 UTC

Brandon Rothel from QED Secure Solutions has found that the VAPIX API tcptest.cgi did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator-privileges compared to administrator-privileges service accounts. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVE-2023-5553 axis vulnerability CVSS: 0 21 Nov 2023, 07:15 UTC

During internal Axis Security Development Model (ASDM) threat-modelling, a flaw was found in the protection for device tampering (commonly known as Secure Boot) in AXIS OS making it vulnerable to a sophisticated attack to bypass this protection. To Axis' knowledge, there are no known exploits of the vulnerability at this time. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVE-2023-21418 axis vulnerability CVSS: 0 21 Nov 2023, 07:15 UTC

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API irissetup.cgi was vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVE-2023-21417 axis vulnerability CVSS: 0 21 Nov 2023, 07:15 UTC

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API manageoverlayimage.cgi was vulnerable to path traversal attacks that allows for file/folder deletion. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account. The impact of exploiting this vulnerability is lower with operator service accounts and limited to non-system files compared to administrator-privileges. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVE-2023-21416 axis vulnerability CVSS: 0 21 Nov 2023, 07:15 UTC

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi was vulnerable to a Denial-of-Service attack allowing for an attacker to block access to the overlay configuration page in the web interface of the Axis device. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account however the impact is equal. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVE-2023-21415 axis vulnerability CVSS: 0 16 Oct 2023, 07:15 UTC

Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API overlay_del.cgi is vulnerable to path traversal attacks that allows for file deletion. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVE-2023-21414 axis vulnerability CVSS: 0 16 Oct 2023, 07:15 UTC

NCC Group has found a flaw during the annual internal penetration test ordered by Axis Communications. The protection for device tampering (commonly known as Secure Boot) contains a flaw which provides an opportunity for a sophisticated attack to bypass this protection. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVE-2023-21413 axis vulnerability CVSS: 0 16 Oct 2023, 07:15 UTC

GoSecure on behalf of Genetec Inc. has found a flaw that allows for a remote code execution during the installation of ACAP applications on the Axis device. The application handling service in AXIS OS was vulnerable to command injection allowing an attacker to run arbitrary code. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

CVE-2023-21412 axis vulnerability CVSS: 0 03 Aug 2023, 07:15 UTC

User provided input is not sanitized on the AXIS License Plate Verifier specific “search.cgi” allowing for SQL injections.

CVE-2023-21411 axis vulnerability CVSS: 0 03 Aug 2023, 07:15 UTC

User provided input is not sanitized in the “Settings > Access Control” configuration interface allowing for arbitrary code execution.

CVE-2023-21410 axis vulnerability CVSS: 0 03 Aug 2023, 07:15 UTC

User provided input is not sanitized on the AXIS License Plate Verifier specific “api.cgi” allowing for arbitrary code execution.

CVE-2023-21409 axis vulnerability CVSS: 0 03 Aug 2023, 07:15 UTC

Due to insufficient file permissions, unprivileged users could gain access to unencrypted administrator credentials allowing the configuration of the application.

CVE-2023-21408 axis vulnerability CVSS: 0 03 Aug 2023, 07:15 UTC

Due to insufficient file permissions, unprivileged users could gain access to unencrypted user credentials that are used in the integration interface towards 3rd party systems.

CVE-2023-21407 axis vulnerability CVSS: 0 03 Aug 2023, 07:15 UTC

A broken access control was found allowing for privileged escalation of the operator account to gain administrator privileges.

CVE-2023-21406 axis vulnerability CVSS: 0 25 Jul 2023, 08:15 UTC

Ariel Harush and Roy Hodir from OTORIO have found a flaw in the AXIS A1001 when communicating over OSDP. A heap-based buffer overflow was found in the pacsiod process which is handling the OSDP communication allowing to write outside of the allocated buffer. By appending invalid data to an OSDP message it was possible to write data beyond the heap allocated buffer. The data written outside the buffer could be used to execute arbitrary code.  lease refer to the Axis security advisory for more information, mitigation and affected products and software versions.

CVE-2023-21405 axis vulnerability CVSS: 0 25 Jul 2023, 08:15 UTC

Knud from Fraktal.fi has found a flaw in some Axis Network Door Controllers and Axis Network Intercoms when communicating over OSDP, highlighting that the OSDP message parser crashes the pacsiod process, causing a temporary unavailability of the door-controlling functionalities meaning that doors cannot be opened or closed. No sensitive or customer data can be extracted as the Axis device is not further compromised. Please refer to the Axis security advisory for more information, mitigation and affected products and software versions.

CVE-2023-21404 axis vulnerability CVSS: 0 08 May 2023, 21:15 UTC

AXIS OS 11.0.X - 11.3.x use a static RSA key in legacy LUA-components to protect Axis-specific source code. The static RSA key is not used in any other secure communication nor can it be used to compromise the device or any customer data.

CVE-2023-22984 axis vulnerability CVSS: 0 21 Feb 2023, 16:15 UTC

A Vulnerability was discovered in Axis 207W network camera. There is a reflected XSS vulnerability in the web administration portal, which allows an attacker to execute arbitrary JavaScript via URL.

CVE-2017-20049 axis vulnerability CVSS: 10.0 15 Jun 2022, 18:15 UTC

A vulnerability, was found in legacy Axis devices such as P3225 and M3005. This affects an unknown part of the component CGI Script. The manipulation leads to improper privilege management. It is possible to initiate the attack remotely.

CVE-2022-23410 axis vulnerability CVSS: 4.4 14 Feb 2022, 22:15 UTC

AXIS IP Utility before 4.18.0 allows for remote code execution and local privilege escalation by the means of DLL hijacking. IPUtility.exe would attempt to load DLLs from its current working directory which could allow for remote code execution if a compromised DLL would be placed in the same folder.

CVE-2021-31988 axis vulnerability CVSS: 6.8 05 Oct 2021, 22:15 UTC

A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to add the Carriage Return and Line Feed (CRLF) control characters and include arbitrary SMTP headers in the generated test email.

CVE-2021-31987 axis vulnerability CVSS: 5.1 05 Oct 2021, 22:15 UTC

A user controlled parameter related to SMTP test functionality is not correctly validated making it possible to bypass blocked network recipients.

CVE-2021-31986 axis vulnerability CVSS: 4.0 05 Oct 2021, 22:15 UTC

User controlled parameters related to SMTP notifications are not correctly validated. This can lead to a buffer overflow resulting in crashes and data leakage.

CVE-2021-31989 axis vulnerability CVSS: 3.5 25 Aug 2021, 19:15 UTC

A user with permission to log on to the machine hosting the AXIS Device Manager client could under certain conditions extract a memory dump from the built-in Windows Task Manager application. The memory dump may potentially contain credentials of connected Axis devices.

CVE-2018-10664 axis vulnerability CVSS: 5.0 26 Jun 2018, 18:29 UTC

An issue was discovered in the httpd process in multiple models of Axis IP Cameras. There is Memory Corruption.

CVE-2018-10663 axis vulnerability CVSS: 5.0 26 Jun 2018, 18:29 UTC

An issue was discovered in multiple models of Axis IP Cameras. There is an Incorrect Size Calculation.

CVE-2018-10662 axis vulnerability CVSS: 10.0 26 Jun 2018, 18:29 UTC

An issue was discovered in multiple models of Axis IP Cameras. There is an Exposed Insecure Interface.

CVE-2018-10661 axis vulnerability CVSS: 10.0 26 Jun 2018, 18:29 UTC

An issue was discovered in multiple models of Axis IP Cameras. There is a bypass of access control.

CVE-2018-10660 axis vulnerability CVSS: 10.0 26 Jun 2018, 18:29 UTC

An issue was discovered in multiple models of Axis IP Cameras. There is Shell Command Injection.

CVE-2018-10659 axis vulnerability CVSS: 5.0 26 Jun 2018, 18:29 UTC

There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which allows remote attackers to cause a denial of service (crash) by sending a crafted command which will result in a code path that calls the UND undefined ARM instruction.

CVE-2018-10658 axis vulnerability CVSS: 5.0 26 Jun 2018, 18:29 UTC

There was a Memory Corruption issue discovered in multiple models of Axis IP Cameras which causes a denial of service (crash). The crash arises from code inside libdbus-send.so shared object or similar.

CVE-2018-9158 axis vulnerability CVSS: 5.0 01 Apr 2018, 18:29 UTC

An issue was discovered on AXIS M1033-W (IP camera) Firmware version 5.40.5.1 devices. They don't employ a suitable mechanism to prevent a DoS attack, which leads to a response time delay. An attacker can use the hping3 tool to perform an IPv4 flood attack, and the services are interrupted from attack start to end.

CVE-2018-9157 axis vulnerability CVSS: 7.6 01 Apr 2018, 18:29 UTC

An issue was discovered on AXIS M1033-W (IP camera) Firmware version 5.40.5.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality

CVE-2018-9156 axis vulnerability CVSS: 7.6 01 Apr 2018, 18:29 UTC

An issue was discovered on AXIS P1354 (IP camera) Firmware version 5.90.1.1 devices. The upload web page doesn't verify the file type, and an attacker can upload a webshell by making a fileUpload.shtml request for a custom .shtml file, which is interpreted by the Apache HTTP Server mod_include module with "<!--#exec cmd=" support. The file needs to include a specific string to meet the internal system architecture. After the webshell upload, an attacker can use the webshell to perform remote code execution such as running a system command (ls, ping, cat /etc/passwd, etc.). NOTE: the vendor reportedly indicates that this is an intended feature or functionality

CVE-2017-15885 axis vulnerability CVSS: 4.3 25 Oct 2017, 06:29 UTC

Reflected XSS in the web administration portal on the Axis 2100 Network Camera 2.03 allows an attacker to execute arbitrary JavaScript via the conf_Layout_OwnTitle parameter to view/view.shtml. NOTE: this might overlap CVE-2007-5214.

CVE-2017-12413 axis vulnerability CVSS: 4.3 04 Aug 2017, 13:29 UTC

AXIS 2100 devices 2.43 have XSS via the URI, possibly related to admin/admin.shtml.

CVE-2015-8257 axis vulnerability CVSS: 9.0 02 May 2017, 14:59 UTC

The devtools.sh script in AXIS network cameras allows remote authenticated users to execute arbitrary commands via shell metacharacters in the app parameter to (1) app_license.shtml, (2) app_license_custom.shtml, (3) app_index.shtml, or (4) app_params.shtml.

CVE-2015-8256 axis vulnerability CVSS: 4.3 17 Apr 2017, 16:59 UTC

Multiple cross-site scripting (XSS) vulnerabilities in Axis network cameras.

CVE-2015-8258 axis vulnerability CVSS: 7.8 10 Apr 2017, 03:59 UTC

AXIS Communications products with firmware through 5.80.x allow remote attackers to modify arbitrary files as root via vectors involving Open Script Editor, aka a "resource injection vulnerability."

CVE-2015-8255 axis vulnerability CVSS: 6.8 10 Apr 2017, 03:59 UTC

AXIS Communications products allow CSRF, as demonstrated by admin/pwdgrp.cgi, vaconfig.cgi, and admin/local_del.cgi.

CVE-2013-3543 axis vulnerability CVSS: 8.8 04 Oct 2013, 23:55 UTC

The AXIS Media Control (AMC) ActiveX control (AxisMediaControlEmb.dll) 6.2.10.11 for AXIS network cameras allows remote attackers to create or overwrite arbitrary files via a file path to the (1) StartRecord, (2) SaveCurrentImage, or (3) StartRecordMedia methods.

CVE-2011-5261 axis vulnerability CVSS: 4.3 12 Feb 2013, 20:55 UTC

Cross-site scripting (XSS) vulnerability in serverreport.cgi in Axis M10 Series Network Cameras M1054 firmware 5.21 and earlier allows remote attackers to inject arbitrary web script or HTML via the pageTitle parameter to admin/showReport.shtml.

CVE-2008-5260 axis vulnerability CVSS: 9.3 26 Jan 2009, 15:30 UTC

Heap-based buffer overflow in the CamImage.CamImage.1 ActiveX control in AxisCamControl.ocx in AXIS Camera Control 2.40.0.0 allows remote attackers to execute arbitrary code via a long image_pan_tilt property value.

CVE-2007-5213 axis vulnerability CVSS: 9.3 04 Oct 2007, 23:17 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware 2.43 and earlier allow remote attackers to perform actions as administrators, as demonstrated by (1) an SMTP server change through the conf_SMTP_MailServer1 parameter to ServerManager.srv and (2) a hostname change through the conf_Network_HostName parameter on the Network page.

CVE-2007-5212 axis vulnerability CVSS: 4.3 04 Oct 2007, 23:17 UTC

Multiple cross-site scripting (XSS) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware before 2.43 allow remote attackers to inject arbitrary web script or HTML via (1) parameters associated with saved settings, as demonstrated by the conf_SMTP_MailServer1 parameter to ServerManager.srv; or (2) the subpage parameter to wizard/first/wizard_main_first.shtml. NOTE: an attacker can leverage a CSRF vulnerability to modify saved settings.

CVE-2007-5214 axis vulnerability CVSS: 4.3 04 Oct 2007, 23:17 UTC

Multiple cross-site scripting (XSS) vulnerabilities in the AXIS 2100 Network Camera 2.02 with firmware 2.43 and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the PATH_INFO to the default URI associated with a directory, as demonstrated by (a) the root directory and (b) the view/ directory; (2) parameters associated with saved settings, as demonstrated by (c) the conf_Network_HostName parameter on the Network page and (d) the conf_Layout_OwnTitle parameter to ServerManager.srv; and (3) the query string to ServerManager.srv, which is displayed on the logs page. NOTE: an attacker can leverage a CSRF vulnerability to modify saved settings.

CVE-2007-4926 axis vulnerability CVSS: 9.3 18 Sep 2007, 18:17 UTC

The AXIS 207W camera uses a base64-encoded cleartext username and password for authentication, which allows remote attackers to obtain sensitive information by sniffing the wireless network or by leveraging unspecified other vectors.

CVE-2007-4928 axis vulnerability CVSS: 4.9 18 Sep 2007, 18:17 UTC

The AXIS 207W camera stores a WEP or WPA key in cleartext in the configuration file, which might allow local users to obtain sensitive information.

CVE-2007-4929 axis vulnerability CVSS: 4.3 18 Sep 2007, 18:17 UTC

Multiple cross-site scripting (XSS) vulnerabilities in the AXIS 207W camera allow remote attackers to inject arbitrary web script or HTML via the camNo parameter to incl/image_incl.shtml, and other unspecified vectors.

CVE-2007-4930 axis vulnerability CVSS: 4.3 18 Sep 2007, 18:17 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities in the AXIS 207W camera allow remote attackers to perform certain actions as administrators via (1) axis-cgi/admin/restart.cgi, (2) the user and sgrp parameters to axis-cgi/admin/pwdgrp.cgi in an add action, or (3) the server parameter to admin/restartMessage.shtml.

CVE-2007-4927 axis vulnerability CVSS: 3.5 18 Sep 2007, 18:17 UTC

axis-cgi/buffer/command.cgi on the AXIS 207W camera allows remote authenticated users to cause a denial of service (reboot) via many requests with unique buffer names in the buffername parameter in a start action.

CVE-2007-2239 axis vulnerability CVSS: 9.3 07 May 2007, 19:19 UTC

Stack-based buffer overflow in the SaveBMP method in the AXIS Camera Control (aka CamImage) ActiveX control before 2.40.0.0 in AxisCamControl.ocx in AXIS 2100, 2110, 2120, 2130 PTZ, 2420, 2420-IR, 2400, 2400+, 2401, 2401+, 2411, and Panorama PTZ allows remote attackers to cause a denial of service (Internet Explorer crash) or execute arbitrary code via a long argument.

CVE-2004-2427 axis vulnerability CVSS: 10.0 31 Dec 2004, 05:00 UTC

Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to obtain sensitive information via direct requests to (1) admin/getparam.cgi, (2) admin/systemlog.cgi, (3) admin/serverreport.cgi, and (4) admin/paramlist.cgi, modify system information via (5) setparam.cgi and (6) factorydefault.cgi, or (7) cause a denial of service (reboot) via restart.cgi.

CVE-2004-2425 axis vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to execute arbitrary commands via accent (`) and possibly other shell metacharacters in the query string to virtualinput.cgi.

CVE-2004-0789 axis vulnerability CVSS: 5.0 31 Dec 2004, 05:00 UTC

Multiple implementations of the DNS protocol, including (1) Poslib 1.0.2-1 and earlier as used by Posadis, (2) Axis Network products before firmware 3.13, and (3) Men & Mice Suite 2.2x before 2.2.3 and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (CPU and network bandwidth consumption) by triggering a communications loop via (a) DNS query packets with localhost as a spoofed source address, or (b) a response packet that triggers a response packet.

CVE-2004-2426 axis vulnerability CVSS: 5.0 31 Dec 2004, 05:00 UTC

Directory traversal vulnerability in Axis Network Camera 2.40 and earlier, and Video Server 3.12 and earlier, allows remote attackers to bypass authentication via a .. (dot dot) in an HTTP POST request to ServerManager.srv, then use these privileges to conduct other activities, such as modifying files using editcgi.cgi.

CVE-2003-1386 axis vulnerability CVSS: 6.4 31 Dec 2003, 05:00 UTC

AXIS 2400 Video Server 2.00 through 2.33 allows remote attackers to obtain sensitive information via an HTTP request to /support/messages, which displays the server's /var/log/messages file.

CVE-2003-0240 axis vulnerability CVSS: 10.0 09 Jun 2003, 04:00 UTC

The web-based administration capability for various Axis Network Camera products allows remote attackers to bypass access restrictions and modify configuration via an HTTP request to the admin/admin.shtml containing a leading // (double slash).

CVE-2001-1543 axis vulnerability CVSS: 7.5 31 Dec 2001, 05:00 UTC

Axis network camera 2120, 2110, 2100, 200+ and 200 contains a default administration password "pass", which allows remote attackers to gain access to the camera.

CVE-2000-0191 axis vulnerability CVSS: 10.0 29 Feb 2000, 05:00 UTC

Axis StorPoint CD allows remote attackers to access administrator URLs without authentication via a .. (dot dot) attack.

CVE-2000-0144 axis vulnerability CVSS: 7.5 07 Feb 2000, 05:00 UTC

Axis 700 Network Scanner does not properly restrict access to administrator URLs, which allows users to bypass the password protection via a .. (dot dot) attack.