CVE-2024-8160

Published Nov 26, 2024

Last updated 3 months ago

Overview

Description
Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Source
product-security@axis.com
NVD status
Received

Risk scores

CVSS 3.1

Type
Secondary
Base score
3.8
Impact score
2.5
Exploitability score
1.2
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
Severity
LOW

Weaknesses

product-security@axis.com
CWE-1286

Social media

Hype score
Not currently trending