Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 Nov 2024 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | Sandro Poppi, member of the AXIS OS Bug Bounty Program, has found that the VAPIX APIs local_list.cgi, create_overlay.cgi and irissetup.cgi was vulnerable for file globbing which could lead to a resource exhaustion attack. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. |
Weaknesses | CWE-155 |

Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2024-11-08T08:51:53.794Z
Reserved: 2023-11-21T07:10:24.938Z
Link: CVE-2024-0054

Updated: 2024-08-01T17:41:15.908Z

Status : Awaiting Analysis
Published: 2024-03-19T07:15:07.033
Modified: 2024-11-21T08:45:48.897
Link: CVE-2024-0054

No data.

No data.