Axis

Axis Os

50 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.19%
  • Veröffentlicht 08.04.2025 05:38:02
  • Zuletzt bearbeitet 14.01.2026 14:41:02

During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Manag...

  • EPSS 0.16%
  • Veröffentlicht 08.04.2025 05:33:58
  • Zuletzt bearbeitet 14.01.2026 14:46:03

51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of th...

  • EPSS 0.15%
  • Veröffentlicht 04.03.2025 06:15:30
  • Zuletzt bearbeitet 22.01.2026 20:59:43

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level in the VAPIX service account D-Bus API.

  • EPSS 0.11%
  • Veröffentlicht 04.03.2025 06:15:30
  • Zuletzt bearbeitet 22.01.2026 21:01:59

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods within the framework. Axis has released patched AXI...

  • EPSS 0.2%
  • Veröffentlicht 04.03.2025 06:15:29
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Dzmitry Lukyanenka, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API param.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the web interface of the Axis device. Other API endpoints or se...

  • EPSS 0.29%
  • Veröffentlicht 04.03.2025 06:15:29
  • Zuletzt bearbeitet 15.04.2026 00:35:42

51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API mediaclip.cgi did not have a sufficient input validation allowing for uploading more audio clips then designed resulting in the Axis device running out of memory.  Axis h...

  • EPSS 0.35%
  • Veröffentlicht 04.03.2025 06:15:29
  • Zuletzt bearbeitet 22.01.2026 16:35:55

Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files to the Axis device w...

  • EPSS 0.07%
  • Veröffentlicht 26.11.2024 08:15:08
  • Zuletzt bearbeitet 15.04.2026 00:35:42

51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API managedoverlayimages.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the overlay configuration page in the web interface of the ...

  • EPSS 0.05%
  • Veröffentlicht 26.11.2024 08:15:07
  • Zuletzt bearbeitet 22.01.2026 16:41:04

Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. Thi...

  • EPSS 0.01%
  • Veröffentlicht 10.09.2024 06:15:02
  • Zuletzt bearbeitet 15.04.2026 00:35:42

During internal Axis Security Development Model (ASDM) threat-modelling, a flaw was found in the protection for device tampering (commonly known as Secure Boot) in AXIS OS making it vulnerable to a sophisticated attack to bypass this protection. To A...