Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 26 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 26 Nov 2024 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | |
Weaknesses | CWE-1286 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2025-03-28T07:18:14.700Z
Reserved: 2024-08-26T06:30:37.790Z
Link: CVE-2024-8160

Updated: 2024-11-26T14:03:56.432Z

Status : Received
Published: 2024-11-26T08:15:07.893
Modified: 2024-11-26T08:15:07.893
Link: CVE-2024-8160

No data.

No data.