Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 26 Nov 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | |
Weaknesses | CWE-1286 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Axis
Published: 2024-11-26T07:27:32.229Z
Updated: 2024-11-26T14:09:25.517Z
Reserved: 2024-08-26T06:30:37.790Z
Link: CVE-2024-8160
Vulnrichment
Updated: 2024-11-26T14:03:56.432Z
NVD
Status : Received
Published: 2024-11-26T08:15:07.893
Modified: 2024-11-26T08:15:07.893
Link: CVE-2024-8160
Redhat
No data.