Description
Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
INFO
Published Date :
2024-11-26T07:27:32.229Z
Last Modified :
2025-03-28T07:18:14.700Z
Source :
Axis
AFFECTED PRODUCTS
The following products are affected by CVE-2024-8160 vulnerability.
| Vendors | Products |
|---|---|
| Axis |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-8160.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact