4.3

CVE-2025-9524

The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerAxis Communications AB
Produkt AXIS OS
Default Statusunaffected
Version < 6.50.5.21
Version 6.50.0
Status affected
Version < 8.40.89
Version 7.0.0
Status affected
Version < 9.80.123
Version 9.0.0
Status affected
Version < 10.12.305
Version 10.0.0
Status affected
Version < 11.11.177
Version 11.0.0
Status affected
Version < 12.7.11
Version 12.0.0
Status affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.07% 0.226
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
product-security@axis.com 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CWE-1287 Improper Validation of Specified Type of Input

The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates that the input is actually of the expected type.