FIRMWARE RELEASE NOTE ===================== Products affected: AXIS A8004 Release date: 2019-12-03 Release type: Production Firmware version: 1.65.4 Preceding release: 1.65.3.2 -------------------------------------------------------------------------------- Upgrade instructions ==================== Upgrade the firmware according to the instructions given at https://www.axis.com/ca/en/support/tecnical-notes/how-to-upgrade or howtoupgrade.txt, which is included in the firmware folder. New features in 1.65.4 ====================== 1.65.4:F01 Added SIP functionality for early media video preview. 1.65.4:F02 Added SIP functionality for receiving calls with H.264 main and high profile. 1.65.4:F03 Added SIP functionality for TLSv1.2. 1.65.4:F04 Increase SIP call history to 100 items. Corrections in 1.65.4 since 1.65.3.2 ================================= 1.65.4:C01 Multiple minor SIP improvments. 1.65.4:C02 Multiple minor platform improvements. 1.65.4:C03 Removed the root users default password in factory defaulted firmware. The password of the root user must be set first in order to initialize VAPIX and ONVIF interfaces to allow further configuration. This change only affects products in its factory defaulted state, products that are already deployed in production systems are not affected by this update until factory defaulted. 1.65.4:C04 Corrected an issue that prevented the insertion of triggered data in SEI messages when streaming H.264. 1.65.4:C05 Updated OpenSSL to version 1.0.2s to increase overall minimum cyber security level. 1.65.4:C06 Updated libssh2 to version 1.8.2 due to that version 1.8.1 broke publickey-userauth requests. 1.65.4:C07 Updated Mozilla ca-certificates to versions available at 20190122. 1.65.4:C08 Corrected security vulnerability in Systemd CVE-2019-6454 to increase overall minimum cyber security level. 1.65.4:C09 Improved robustness of the O3C client. 1.65.4:C10 Updated Apache to version 2.4.39 to increase overall minimum cyber security level. 1.65.4:C11 Patched the following security vulnerabilities to increase overall minimum cyber security level: CVE-2019-3855, CVE-2019-3856, CVE-2019-3857, CVE-2019-3858, CVE-2019-3859, CVE-2019-3860, CVE-2019-3861, CVE-2019-3862, CVE-2019-3863. 1.65.4:C12 Corrected the following vulnerabilities in order to increase overall minimum cyber security level: CVE-2018-16865, CVE-2018-16866. 1.65.4:C13 Corrected an issue that prevented the user from uploading a certificate that contains “Bag Attributes” before and after the actual certificate content. 1.65.4:C14 Corrected an issue that caused event notifications not been triggered on storage disruption. 1.65.4:C15 Corrected an issue with HTTP response which prevented the camera from streaming on rare occasions. 1.65.4:C16 Corrected an issues that could cause an incorrect error message when testing HTTP recipient. 1.65.4:C17 Patched security vulernability CVE-2018-17182 to increase overall minimum cyber security level. 1.65.4:C18 Adjusted re-connection behavior of interrupted AVHS connections on AVHS-server side. The time between failed connection attempts will now gradually increase until a hard limit is reached. 1.65.4:C19 Patched the security vulnerability CVE-2017-16544 in BusyBox to increase overall minimum cyber security level. 1.65.4:C20 Corrected an issue in the ACAP framework that could cause ACAPs to freeze on rare occasions. 1.65.4:C21 Corrected an issue that could cause corrupted video recordings when UserData or TriggerData are enabled. Known Bugs/Limitations ====================== 1.65.4:L1 It's recommended to factory default the unit before making a downgrade if needed. 1.65.4:L2 When using mp3 files with other samplerates than the native 16kHz performance might suffer and delays be introduced. 1.65.4:L3 As action rules holds copies of recipient information independentally of the Recipient configuration, it is possible to call a SIP recipient using an action rule despite the recipient is removed in the Recipent configuration. To prevent this, one must remove the recipient from the action rule too. 1.65.4:L4 It is not possible to send both RFC2388 and RFC2976 DTMFs through Asterisk at the same time. This limitation can be avoided by using one of RFC 2388 or RFC 2976. It can also be avoided by using Asterisk to transcode into RFC 2976. 1.65.4:L5 Denied access does not show in access log (System Options>Support>Logs and Reports>Access Log) 1.65.4:L6 When the device is facing up or down, tilt tampering detection fuctionality does not work optimally and may generate to events oftern even though the device is not moved or tilted. (The gravity does not effect the two axis normally used for the tilt detection making it sensitive to noise) Supported AXIS VAPIX API Image Resolutions for AXIS A8004 ================================================================================ Resolution Exceptions ========== ========== 1280x960 1280x720 1024x768 1024x640 800x600 800x500 800x450 640x480 640x400 640x360 480x360 480x300 480x270 320x240 320x200 320x180 240x180 176x144 160x120 160x100 160x90 1400x1050 1) 768x576 1) 720x576 1) 704x576 1) 704x480 1) 704x288 1) 704x240 1) 384x288 1) 352x288 1) 352x240 1) 240x135 1) 192x144 1) 176x120 1) 80x50 1) 1) Not visible in web user interface