51l3nc3, member of the AXIS OS Bug Bounty Program, has found that a Guard Tour VAPIX API parameter allowed the use of arbitrary values allowing for an attacker to block access to the guard tour configuration page in the web interface of the Axis device. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
History

Fri, 08 Nov 2024 09:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1286

Tue, 10 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Sep 2024 05:15:00 +0000

Type Values Removed Values Added
Description 51l3nc3, member of the AXIS OS Bug Bounty Program, has found that a Guard Tour VAPIX API parameter allowed the use of arbitrary values allowing for an attacker to block access to the guard tour configuration page in the web interface of the Axis device. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Axis

Published: 2024-09-10T05:03:35.854Z

Updated: 2024-11-08T08:46:06.600Z

Reserved: 2024-06-19T19:16:21.128Z

Link: CVE-2024-6173

cve-icon Vulnrichment

Updated: 2024-09-10T14:28:27.753Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-10T05:15:12.850

Modified: 2024-11-08T09:15:07.787

Link: CVE-2024-6173

cve-icon Redhat

No data.