Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. |
Weaknesses | CWE-155 |
MITRE
Status: PUBLISHED
Assigner: Axis
Published: 2024-03-19T06:35:15.078Z
Updated: 2024-11-08T08:51:53.794Z
Reserved: 2023-11-21T07:10:24.938Z
Link: CVE-2024-0054
Vulnrichment
Updated: 2024-08-01T17:41:15.908Z
NVD
Status : Awaiting Analysis
Published: 2024-03-19T07:15:07.033
Modified: 2024-11-08T09:15:07.097
Link: CVE-2024-0054
Redhat
No data.