Axis

Axis Os

35 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 04.03.2025 06:15:29
  • Zuletzt bearbeitet 04.03.2025 06:15:29

51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API mediaclip.cgi did not have a sufficient input validation allowing for uploading more audio clips then designed resulting in the Axis device running out of memory.  Axis h...

  • EPSS 0.42%
  • Veröffentlicht 04.03.2025 06:15:29
  • Zuletzt bearbeitet 04.03.2025 06:15:29

Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files to the Axis device w...

  • EPSS 0.17%
  • Veröffentlicht 26.11.2024 08:15:08
  • Zuletzt bearbeitet 26.11.2024 08:15:08

51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API managedoverlayimages.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the overlay configuration page in the web interface of the ...

  • EPSS 0.76%
  • Veröffentlicht 26.11.2024 08:15:07
  • Zuletzt bearbeitet 26.11.2024 08:15:07

Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. Thi...

  • EPSS 0.06%
  • Veröffentlicht 10.09.2024 06:15:02
  • Zuletzt bearbeitet 08.11.2024 09:15:08

During internal Axis Security Development Model (ASDM) threat-modelling, a flaw was found in the protection for device tampering (commonly known as Secure Boot) in AXIS OS making it vulnerable to a sophisticated attack to bypass this protection. To A...

  • EPSS 0.09%
  • Veröffentlicht 10.09.2024 06:15:01
  • Zuletzt bearbeitet 08.11.2024 09:15:07

Amin Aliakbari, member of the AXIS OS Bug Bounty Program, has found a broken access control which would lead to less-privileged operator- and/or viewer accounts having more privileges than designed. The risk of exploitation is very low as it requires...

  • EPSS 0.19%
  • Veröffentlicht 10.09.2024 05:15:12
  • Zuletzt bearbeitet 29.11.2024 06:15:07

51l3nc3, member of the AXIS OS Bug Bounty Program, has found that a Guard Tour VAPIX API parameter allowed the use of arbitrary values allowing for an attacker to block access to the guard tour configuration page in the web interface of the Axis devi...

  • EPSS 0.25%
  • Veröffentlicht 10.09.2024 05:15:12
  • Zuletzt bearbeitet 29.11.2024 06:15:07

Marinus Pfund, member of the AXIS OS Bug Bounty Program, has found the VAPIX API alwaysmulti.cgi was vulnerable for file globbing which could lead to resource exhaustion of the Axis device. Axis has released patched AXIS OS versions for the highlig...

  • EPSS 0.18%
  • Veröffentlicht 10.09.2024 05:15:10
  • Zuletzt bearbeitet 08.11.2024 09:15:07

Marinus Pfund, member of the AXIS OS Bug Bounty Program, has found the VAPIX API ledlimit.cgi was vulnerable for path traversal attacks allowing to list folder/file names on the local file system of the Axis device. Axis has released patched AXIS O...

  • EPSS 0.05%
  • Veröffentlicht 18.06.2024 06:15:10
  • Zuletzt bearbeitet 21.11.2024 08:45:49

Johan Fagerström, member of the AXIS OS Bug Bounty Program, has found that a O3C feature may expose sensitive traffic between the client (Axis device) and (O3C) server. If O3C is not being used this flaw does not apply. Axis has released patched AXI...