Description

Erik de Jong, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API ftptest.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files from/to the Axis device. This flaw can only be exploited after authenticating with an administrator-privileged service account. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

INFO

Published Date :

2024-11-26T07:27:32.229Z

Last Modified :

2025-03-28T07:18:14.700Z

Source :

Axis
AFFECTED PRODUCTS

The following products are affected by CVE-2024-8160 vulnerability.

Vendors Products
Axis
  • Axis Os
  • Axis Os 2022
  • Axis Os 2024
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-8160.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact