Axis OS Flaw May Expose Sensitive Traffic
CVE-2024-0066
5.3MEDIUM
Key Information
- Vendor
- Axis Communications Ab
- Status
- Axis Os
- Vendor
- CVE Published:
- 18 June 2024
Summary
Johan Fagerström, member of the AXIS OS Bug Bounty Program, has found that a O3C feature may expose sensitive traffic between the client (Axis device) and (O3C) server. If O3C is not being used this flaw does not apply. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Affected Version(s)
AXIS OS = AXIS OS 5.51 -11.9
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database