First published: Tue Nov 26 2024(Updated: )
51l3nc3, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API managedoverlayimages.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the overlay configuration page in the web interface of the Axis device. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Credit: product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
AXIS AXIS OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8772 is considered a moderate severity vulnerability due to its potential to block access to critical overlay configuration settings.
To mitigate CVE-2024-8772, it is recommended to update the AXIS OS to the latest version provided by Axis.
CVE-2024-8772 allows an attacker to exploit a race condition that can block access to the overlay configuration page on Axis devices.
Yes, CVE-2024-8772 can be exploited remotely, making it critical for users to secure their devices.
CVE-2024-8772 affects devices running the AXIS OS, specifically those utilizing the VAPIX API.