51l3nc3, member of the AXIS OS Bug Bounty Program, has found that a Guard Tour VAPIX API parameter allowed the use of arbitrary values allowing for an attacker to block access to the guard tour configuration page in the web interface of the Axis device.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Metrics
Affected Vendors & Products
References
History
Fri, 08 Nov 2024 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1286 |
Tue, 10 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Sep 2024 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | 51l3nc3, member of the AXIS OS Bug Bounty Program, has found that a Guard Tour VAPIX API parameter allowed the use of arbitrary values allowing for an attacker to block access to the guard tour configuration page in the web interface of the Axis device. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Axis
Published: 2024-09-10T05:03:35.854Z
Updated: 2024-11-08T08:46:06.600Z
Reserved: 2024-06-19T19:16:21.128Z
Link: CVE-2024-6173
Vulnrichment
Updated: 2024-09-10T14:28:27.753Z
NVD
Status : Awaiting Analysis
Published: 2024-09-10T05:15:12.850
Modified: 2024-11-08T09:15:07.787
Link: CVE-2024-6173
Redhat
No data.