The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-31988

CVE-2021-31988: Axis OS SMTP Header Injection Vulnerability

CVE-2021-31988 is a CRLF injection flaw in Axis OS that allows attackers to inject arbitrary SMTP headers through improperly validated parameters. This article covers technical details, affected versions, and mitigation.

Published: February 25, 2026

CVE-2021-31988 Overview

CVE-2021-31988 is a CRLF (Carriage Return Line Feed) injection vulnerability affecting multiple versions of Axis OS. The vulnerability exists in the SMTP test functionality where a user-controlled parameter is not correctly validated, allowing attackers to inject Carriage Return (\r) and Line Feed (\n) control characters. This improper input validation enables the inclusion of arbitrary SMTP headers in generated test emails, potentially leading to email spoofing, phishing attacks, or other malicious email-based exploits.

Critical Impact

This vulnerability allows network-based attackers to manipulate SMTP headers in test emails, potentially enabling email spoofing, spam relay abuse, or phishing campaigns through compromised Axis network devices.

Affected Products

  • Axis OS (Active Track) - versions prior to security patch
  • Axis OS 2016 LTS
  • Axis OS 2018 LTS
  • Axis OS 2020 LTS

Discovery Timeline

  • 2021-10-05 - CVE-2021-31988 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-31988

Vulnerability Analysis

This vulnerability falls under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) and CWE-1286 (Improper Validation of Syntactic Correctness of Input). The SMTP test functionality in Axis OS devices accepts user input that is directly incorporated into SMTP email headers without proper sanitization.

When SMTP test emails are generated, the application fails to strip or encode CRLF sequences from user-controlled input fields. In SMTP protocol, CRLF sequences (\r\n) are used to separate headers, meaning an attacker can terminate an existing header prematurely and inject additional headers of their choosing.

The network-based attack vector requires user interaction but allows an authenticated or unauthenticated attacker (depending on device configuration) to manipulate the email generation process with complete confidentiality, integrity, and availability impact on the affected component.

Root Cause

The root cause of CVE-2021-31988 is insufficient input validation in the SMTP test functionality of Axis OS. The application accepts user input parameters for email generation without properly sanitizing or rejecting CRLF control characters. When these characters are present in user input, they are passed directly to the SMTP email generation logic, allowing header injection.

Proper input validation should either strip CRLF sequences entirely or reject input containing these control characters when processing email-related parameters.

Attack Vector

The attack exploits the SMTP test functionality accessible through the Axis device's management interface. An attacker crafts a malicious input containing CRLF sequences followed by arbitrary SMTP headers. When the device processes this input to generate a test email, the injected headers become part of the email message.

For example, an attacker could inject headers such as Bcc:, Cc:, Subject:, or From: to redirect emails, spoof sender information, or modify email content. In more sophisticated scenarios, attackers could inject complete email body content by adding a blank line (double CRLF) after the headers.

The vulnerability is exploited by inserting characters like %0d%0a (URL-encoded CRLF) into parameter fields that are used in SMTP header construction. See the Axis Security Advisory for complete technical details.

Detection Methods for CVE-2021-31988

Indicators of Compromise

  • Unusual SMTP traffic patterns originating from Axis devices
  • Test emails containing unexpected headers or recipients
  • HTTP requests to device management interfaces containing URL-encoded CRLF sequences (%0d%0a or %0D%0A)
  • Log entries showing SMTP test functionality being invoked with abnormally long or suspicious parameter values

Detection Strategies

  • Monitor HTTP request parameters to Axis device management interfaces for CRLF injection patterns (%0d, %0a, \r, \n)
  • Implement network-level inspection for outbound SMTP traffic from Axis devices with unexpected or spoofed headers
  • Deploy SentinelOne Singularity to detect anomalous network behavior from IoT and embedded devices
  • Review SMTP server logs for emails originating from Axis devices with irregular header structures

Monitoring Recommendations

  • Enable detailed logging on Axis devices and forward logs to a SIEM solution
  • Configure email gateway monitoring to flag emails from Axis devices with suspicious header patterns
  • Implement network segmentation to isolate Axis devices and monitor cross-segment traffic
  • Use SentinelOne's network detection capabilities to identify exploitation attempts targeting embedded devices

How to Mitigate CVE-2021-31988

Immediate Actions Required

  • Update all affected Axis OS devices to the latest patched firmware version immediately
  • Restrict network access to Axis device management interfaces using firewall rules or network segmentation
  • Review and audit any test emails sent from Axis devices for signs of header injection
  • Implement web application firewall (WAF) rules to block CRLF injection attempts targeting device management interfaces
  • Disable SMTP test functionality if not required for operations

Patch Information

Axis Communications has released security patches addressing this vulnerability. Refer to the Axis Security Advisory CVE-2021-31988 for detailed patch information, affected firmware versions, and upgrade instructions specific to your device model.

Ensure all Axis OS devices are updated to versions that include the fix for CVE-2021-31988. This includes devices running Axis OS Active Track and Axis OS 2016, 2018, and 2020 LTS versions.

Workarounds

  • Restrict access to device management interfaces to trusted networks and administrators only
  • Implement input validation at network perimeter devices (WAF, reverse proxy) to filter CRLF sequences
  • Disable SMTP test functionality through device configuration if it is not operationally required
  • Monitor and alert on any SMTP test functionality usage until patches can be applied
bash
# Example: Network segmentation rule to restrict access to Axis device management
# Restrict management interface access to admin network only
iptables -A INPUT -p tcp --dport 443 -s 10.0.1.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

# Block common CRLF injection patterns at network edge (example for inspection)
# Note: Implement proper URL decoding before pattern matching
# %0d%0a, %0D%0A patterns should be flagged/blocked in HTTP requests

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeXSS

  • Vendor/TechAxis Os

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.61%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-1286

  • CWE-74
  • Vendor Resources
  • Axis Security Advisory CVE-2021-31988
  • Related CVEs
  • CVE-2021-31986: Axis OS Buffer Overflow Vulnerability

  • CVE-2024-7784: AXIS OS Secure Boot Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English