First published: Tue Mar 04 2025(Updated: )
Dzmitry Lukyanenka, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API param.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the web interface of the Axis device. Other API endpoints or services not making use of param.cgi are not affected. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Credit: product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
AXIS OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47262 is classified as a high severity vulnerability due to its potential to block access to the web interface of the Axis device.
To mitigate CVE-2024-47262, ensure that your Axis device software is updated to the latest version provided by Axis which addresses this vulnerability.
CVE-2024-47262 affects Axis devices running the AXIS OS that utilize the VAPIX API param.cgi.
CVE-2024-47262 allows for a race condition attack that can block access to the web interface of affected Axis devices.
No, only the param.cgi endpoint of the VAPIX API is affected by CVE-2024-47262; other API endpoints or services are not impacted.