51l3nc3, member of the AXIS OS Bug Bounty Program, has found that a Guard Tour VAPIX API parameter allowed the use of arbitrary values allowing for an attacker to block access to the guard tour configuration page in the web interface of the Axis device.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Metrics
Affected Vendors & Products
References
History
Fri, 29 Nov 2024 06:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 29 Nov 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 08 Nov 2024 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1286 |
Tue, 10 Sep 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 10 Sep 2024 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | 51l3nc3, member of the AXIS OS Bug Bounty Program, has found that a Guard Tour VAPIX API parameter allowed the use of arbitrary values allowing for an attacker to block access to the guard tour configuration page in the web interface of the Axis device. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2024-11-29T05:33:10.464Z
Reserved: 2024-06-19T19:16:21.128Z
Link: CVE-2024-6173

Updated: 2024-09-10T14:28:27.753Z

Status : Awaiting Analysis
Published: 2024-09-10T05:15:12.850
Modified: 2024-11-29T06:15:07.503
Link: CVE-2024-6173

No data.