Search criteria
5 vulnerabilities by zavio
CVE-2023-3959 (GCVE-0-2023-3959)
Vulnerability from cvelistv5 – Published: 2023-11-08 23:02 – Updated: 2025-01-16 21:25 Unsupported When Assigned
VLAI?
Title
Zavio IP Camera Stack-Based Buffer Overflow
Summary
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,
CB6231, B8520, B8220, and CD321
IP Cameras
with firmware version M2.1.6.05 are
vulnerable to multiple instances of stack-based overflows. While
processing XML elements from incoming network requests, the product does
not sufficiently check or validate allocated buffer size. This may lead
to remote code execution.
Severity ?
9.8 (Critical)
CWE
- CWE-121 - Stack-Based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Zavio | IP Camera CF7500 |
Affected:
version M2.1.6.05
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Attila Szasz
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:08:50.665Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-3959",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-16T21:22:12.349735Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-16T21:25:58.442Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7500",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7300",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7201",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7501",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3211",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3212",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB5220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB6231",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8520",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CD321",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Attila Szasz "
}
],
"datePublic": "2023-10-31T20:34:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\nZavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIP Cameras\u003c/span\u003e\n\nwith firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. While \nprocessing XML elements from incoming network requests, the product does\n not sufficiently check or validate allocated buffer size. This may lead\n to remote code execution.\n\n"
}
],
"value": "Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\nIP Cameras\n\nwith firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. While \nprocessing XML elements from incoming network requests, the product does\n not sufficiently check or validate allocated buffer size. This may lead\n to remote code execution.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-Based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-08T23:02:55.581Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"source": {
"advisory": "ICSA-23-304-03",
"discovery": "EXTERNAL"
},
"tags": [
"unsupported-when-assigned"
],
"title": "Zavio IP Camera Stack-Based Buffer Overflow",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "\nThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\n\n\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2023-3959",
"datePublished": "2023-11-08T23:02:55.581Z",
"dateReserved": "2023-07-26T18:38:50.354Z",
"dateUpdated": "2025-01-16T21:25:58.442Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-45225 (GCVE-0-2023-45225)
Vulnerability from cvelistv5 – Published: 2023-11-08 23:00 – Updated: 2025-01-16 21:26 Unsupported When Assigned
VLAI?
Title
Zavio IP Camera Stack-Based Buffer Overflow
Summary
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,
CB6231, B8520, B8220, and CD321
IP Cameras with firmware version M2.1.6.05 are
vulnerable to multiple instances of stack-based overflows. While parsing
certain XML elements from incoming network requests, the product does
not sufficiently check or validate allocated buffer size. This may lead
to remote code execution.
Severity ?
9.8 (Critical)
CWE
- CWE-121 - Stack-Based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Zavio | IP Camera CF7500 |
Affected:
version M2.1.6.05
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Attila Szasz
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T20:14:20.126Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-45225",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-16T21:22:15.343106Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-16T21:26:06.119Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7500",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7300",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7201",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7501",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3211",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3212",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB5220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB6231",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8520",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CD321",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Attila Szasz "
}
],
"datePublic": "2023-10-31T20:34:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\nZavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIP Cameras\u003c/span\u003e\u0026nbsp; with firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. While parsing\n certain XML elements from incoming network requests, the product does \nnot sufficiently check or validate allocated buffer size. This may lead \nto remote code execution.\n\n"
}
],
"value": "Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\nIP Cameras\u00a0 with firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. While parsing\n certain XML elements from incoming network requests, the product does \nnot sufficiently check or validate allocated buffer size. This may lead \nto remote code execution.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-Based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-08T23:00:47.061Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"source": {
"advisory": "ICSA-23-304-03",
"discovery": "EXTERNAL"
},
"tags": [
"unsupported-when-assigned"
],
"title": "Zavio IP Camera Stack-Based Buffer Overflow",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "\nThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\n\n\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2023-45225",
"datePublished": "2023-11-08T23:00:47.061Z",
"dateReserved": "2023-10-10T22:30:47.626Z",
"dateUpdated": "2025-01-16T21:26:06.119Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-43755 (GCVE-0-2023-43755)
Vulnerability from cvelistv5 – Published: 2023-11-08 22:57 – Updated: 2025-01-16 21:26 Unsupported When Assigned
VLAI?
Title
Zavio IP Camera Stack-Based Buffer Overflow
Summary
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,
CB6231, B8520, B8220, and CD321
IP Cameras
with firmware version M2.1.6.05 are
vulnerable to multiple instances of stack-based overflows. During the
processing and parsing of certain fields in XML elements from incoming
network requests, the product does not sufficiently check or validate
allocated buffer size. This may lead to remote code execution.
Severity ?
9.8 (Critical)
CWE
- CWE-121 - Stack-Based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Zavio | IP Camera CF7500 |
Affected:
version M2.1.6.05
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Attila Szasz
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T19:52:11.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-43755",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-16T21:22:18.416772Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-16T21:26:14.927Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7500",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7300",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7201",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7501",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3211",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3212",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB5220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB6231",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8520",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CD321",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Attila Szasz "
}
],
"datePublic": "2023-10-31T20:34:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\nZavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIP Cameras \u003c/span\u003e\n\nwith firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. During the \nprocessing and parsing of certain fields in XML elements from incoming \nnetwork requests, the product does not sufficiently check or validate \nallocated buffer size. This may lead to remote code execution.\n\n"
}
],
"value": "Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\nIP Cameras \n\nwith firmware version M2.1.6.05 are \nvulnerable to multiple instances of stack-based overflows. During the \nprocessing and parsing of certain fields in XML elements from incoming \nnetwork requests, the product does not sufficiently check or validate \nallocated buffer size. This may lead to remote code execution.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-Based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-08T22:57:59.332Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"source": {
"advisory": "ICSA-23-304-03",
"discovery": "EXTERNAL"
},
"tags": [
"unsupported-when-assigned"
],
"title": "Zavio IP Camera Stack-Based Buffer Overflow",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "\nThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\n\n\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2023-43755",
"datePublished": "2023-11-08T22:57:59.332Z",
"dateReserved": "2023-10-10T22:30:47.620Z",
"dateUpdated": "2025-01-16T21:26:14.927Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-39435 (GCVE-0-2023-39435)
Vulnerability from cvelistv5 – Published: 2023-11-08 22:54 – Updated: 2025-01-16 21:26 Unsupported When Assigned
VLAI?
Title
Zavio IP Camera Stack-Based Buffer Overflow
Summary
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,
CB6231, B8520, B8220, and CD321 IP Cameras
with firmware version M2.1.6.05 are
vulnerable to stack-based overflows. During the process of updating
certain settings sent from incoming network requests, the product does
not sufficiently check or validate allocated buffer size. This may lead
to remote code execution.
Severity ?
8.8 (High)
CWE
- CWE-121 - Stack-Based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Zavio | IP Camera CF7500 |
Affected:
version M2.1.6.05
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Attila Szasz
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T18:10:20.723Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-39435",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-16T21:19:50.375217Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-16T21:26:22.506Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7500",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7300",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7201",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7501",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3211",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3212",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB5220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB6231",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8520",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CD321",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Attila Szasz "
}
],
"datePublic": "2023-10-31T20:34:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\nZavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIP Cameras \u003c/span\u003e\n\nwith firmware version M2.1.6.05 are \nvulnerable to stack-based overflows. During the process of updating \ncertain settings sent from incoming network requests, the product does \nnot sufficiently check or validate allocated buffer size. This may lead \nto remote code execution.\n\n"
}
],
"value": "Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 IP Cameras \n\nwith firmware version M2.1.6.05 are \nvulnerable to stack-based overflows. During the process of updating \ncertain settings sent from incoming network requests, the product does \nnot sufficiently check or validate allocated buffer size. This may lead \nto remote code execution.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-Based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-08T22:54:00.819Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"source": {
"advisory": "ICSA-23-304-03",
"discovery": "EXTERNAL"
},
"tags": [
"unsupported-when-assigned"
],
"title": "Zavio IP Camera Stack-Based Buffer Overflow",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "\nThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\n\n\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2023-39435",
"datePublished": "2023-11-08T22:54:00.819Z",
"dateReserved": "2023-10-10T22:30:47.603Z",
"dateUpdated": "2025-01-16T21:26:22.506Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-4249 (GCVE-0-2023-4249)
Vulnerability from cvelistv5 – Published: 2023-11-08 22:51 – Updated: 2025-01-16 21:26 Unsupported When Assigned
VLAI?
Title
Zavio IP Camera Stack-Based Buffer Overflow
Summary
Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,
CB6231, B8520, B8220, and CD321
IP Cameras
with firmware version M2.1.6.05 has a
command injection vulnerability in their implementation of their
binaries and handling of network requests.
Severity ?
8.8 (High)
CWE
- CWE-121 - Stack-Based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Zavio | IP Camera CF7500 |
Affected:
version M2.1.6.05
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Attila Szasz
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:24:03.547Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-4249",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-16T21:19:53.341994Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-01-16T21:26:29.040Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7500",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7300",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7201",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CF7501",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3211",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB3212",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB5220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CB6231",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8520",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera B8220",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "IP Camera CD321",
"vendor": "Zavio",
"versions": [
{
"status": "affected",
"version": "version M2.1.6.05"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Attila Szasz "
}
],
"datePublic": "2023-10-31T20:34:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\nZavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIP Cameras \u003c/span\u003e\n\nwith firmware version M2.1.6.05 has a \ncommand injection vulnerability in their implementation of their \nbinaries and handling of network requests.\n\n"
}
],
"value": "Zavio CF7500, CF7300, CF7201, CF7501, CB3211, CB3212, CB5220,\n CB6231, B8520, B8220, and CD321 \n\nIP Cameras \n\nwith firmware version M2.1.6.05 has a \ncommand injection vulnerability in their implementation of their \nbinaries and handling of network requests.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-Based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-08T22:51:25.143Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03"
}
],
"source": {
"advisory": "ICSA-23-304-03",
"discovery": "EXTERNAL"
},
"tags": [
"unsupported-when-assigned"
],
"title": "Zavio IP Camera Stack-Based Buffer Overflow",
"workarounds": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "\nThe affected products are end-of-life and have been identified to contain many insecurities. The vendor, Zavio, is no longer actively in business and therefore development for firmware fixes, mitigations, and updates are not available and will not become available. CISA recommends users discontinue use of the product.\n\n\n"
}
],
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2023-4249",
"datePublished": "2023-11-08T22:51:25.143Z",
"dateReserved": "2023-08-08T19:16:25.494Z",
"dateUpdated": "2025-01-16T21:26:29.040Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}