First published: Mon Apr 10 2017(Updated: )
AXIS Communications products allow CSRF, as demonstrated by admin/pwdgrp.cgi, vaconfig.cgi, and admin/local_del.cgi.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Axis Axis Communications Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8255 is classified as a medium severity vulnerability due to its potential for unauthorized access via CSRF.
To remediate CVE-2015-8255, it is recommended to apply the latest firmware updates from AXIS Communications that address the CSRF vulnerabilities.
CVE-2015-8255 affects various Axis Communications firmware versions, so checking the specific version in use is crucial.
CVE-2015-8255 can be exploited through Cross-Site Request Forgery (CSRF) attacks, allowing unauthorized commands to be executed.
As a workaround for CVE-2015-8255, consider implementing CSRF tokens or completely restricting access to the vulnerable CGI scripts until a patch is applied.