4.3
CVE-2025-9524
- EPSS 0.08%
- Veröffentlicht 11.11.2025 07:25:45
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle product-security@axis.com
- CVE-Watchlists
- Unerledigt
The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerAxis Communications AB
≫
Produkt
AXIS OS
Default Statusunaffected
Version
6.50.0
Version <
6.50.5.21
Status
affected
Version
7.0.0
Version <
8.40.89
Status
affected
Version
9.0.0
Version <
9.80.123
Status
affected
Version
10.0.0
Version <
10.12.305
Status
affected
Version
11.0.0
Version <
11.11.177
Status
affected
Version
12.0.0
Version <
12.7.11
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.08% | 0.241 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| product-security@axis.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
|
CWE-1287 Improper Validation of Specified Type of Input
The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.