Axis

Axis Os

35 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 12.08.2025 05:18:26
  • Zuletzt bearbeitet 12.08.2025 14:25:33

An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code execution. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if a...

  • EPSS 0.02%
  • Veröffentlicht 12.08.2025 05:14:43
  • Zuletzt bearbeitet 12.08.2025 14:25:33

ACAP applications can be executed with elevated privileges, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an atta...

  • EPSS 0.02%
  • Veröffentlicht 02.06.2025 07:39:50
  • Zuletzt bearbeitet 02.06.2025 17:32:17

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges.

  • EPSS 0.1%
  • Veröffentlicht 02.06.2025 07:36:55
  • Zuletzt bearbeitet 02.06.2025 17:32:17

A Guard Tour VAPIX API parameter allowed the use of arbitrary values and can be incorrectly called, allowing an attacker to block access to the guard tour configuration page in the web interface of the Axis device.

  • EPSS 0.08%
  • Veröffentlicht 02.06.2025 07:32:56
  • Zuletzt bearbeitet 02.06.2025 17:32:17

The VAPIX Device Configuration framework allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges.

  • EPSS 0.05%
  • Veröffentlicht 08.04.2025 05:38:02
  • Zuletzt bearbeitet 08.04.2025 18:13:53

During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Manag...

  • EPSS 0.08%
  • Veröffentlicht 08.04.2025 05:33:58
  • Zuletzt bearbeitet 08.04.2025 18:13:53

51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of th...

  • EPSS 0.03%
  • Veröffentlicht 04.03.2025 06:15:30
  • Zuletzt bearbeitet 04.03.2025 06:15:30

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods within the framework. Axis has released patched AXI...

  • EPSS 0.02%
  • Veröffentlicht 04.03.2025 06:15:30
  • Zuletzt bearbeitet 04.03.2025 06:15:30

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level in the VAPIX service account D-Bus API.

  • EPSS 0.14%
  • Veröffentlicht 04.03.2025 06:15:29
  • Zuletzt bearbeitet 04.03.2025 06:15:29

Dzmitry Lukyanenka, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API param.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the web interface of the Axis device. Other API endpoints or se...