First published: Tue Nov 26 2024(Updated: )
Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Credit: product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
AXIS AXIS OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8160 has been classified as a high severity vulnerability due to its potential for command injection.
To mitigate CVE-2024-8160, ensure that all devices running AXIS OS are updated to the latest version that addresses this vulnerability.
CVE-2024-8160 affects devices running AXIS OS, particularly those utilizing the VAPIX API ftptest.cgi functionality.
CVE-2024-8160 requires authentication, meaning exploitation can only occur after an attacker gains valid access to the affected Axis device.
Exploitation of CVE-2024-8160 may allow an attacker to perform unauthorized file transfers to or from the Axis device.