Axis Os 2024

6 CVEs product

Monthly

CVE-2025-0324 CRITICAL Act Now

Privilege escalation in Axis VAPIX framework.

Privilege Escalation Axis Os 2024 Axis Os
NVD
CVSS 3.1
9.4
EPSS
0.1%
CVE-2025-0361 MEDIUM Monitor

During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Axis Os Axis Os 2024
NVD
CVSS 3.1
4.3
EPSS
0.2%
CVE-2024-47261 MEDIUM This Month

51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Axis Os Axis Os 2022 Axis Os 2024
NVD
CVSS 3.1
4.3
EPSS
0.3%
CVE-2025-0360 HIGH This Week

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Authentication Bypass Axis Os Axis Os 2024
NVD
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-0359 HIGH This Week

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Axis Os Axis Os 2024
NVD
CVSS 3.1
8.5
EPSS
0.1%
CVE-2024-47259 LOW Monitor

Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading. Rated low severity (CVSS 3.5), this vulnerability is remotely exploitable. No vendor patch available.

Command Injection File Upload Axis Os Axis Os 2024
NVD
CVSS 3.1
3.5
EPSS
0.2%
CVE-2025-0324
EPSS 0% CVSS 9.4
CRITICAL Act Now

Privilege escalation in Axis VAPIX framework.

Privilege Escalation Axis Os 2024 Axis Os
NVD
CVE-2025-0361
EPSS 0% CVSS 4.3
MEDIUM Monitor

During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Axis Os Axis Os 2024
NVD
CVE-2024-47261
EPSS 0% CVSS 4.3
MEDIUM This Month

51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access. Rated medium severity (CVSS 4.3), this vulnerability is remotely exploitable, low attack complexity. No vendor patch available.

Information Disclosure Axis Os Axis Os 2022 +1
NVD
CVE-2025-0360
EPSS 0% CVSS 7.8
HIGH This Week

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level. Rated high severity (CVSS 7.8), this vulnerability is low attack complexity. No vendor patch available.

Authentication Bypass Axis Os Axis Os 2024
NVD
CVE-2025-0359
EPSS 0% CVSS 8.5
HIGH This Week

During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods. Rated high severity (CVSS 8.5), this vulnerability is no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Axis Os Axis Os 2024
NVD
CVE-2024-47259
EPSS 0% CVSS 3.5
LOW Monitor

Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading. Rated low severity (CVSS 3.5), this vulnerability is remotely exploitable. No vendor patch available.

Command Injection File Upload Axis Os +1
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy