Race Condition Vulnerability in Axis Device Web Interface
CVE-2024-47262

5.3MEDIUM

Key Information:

Status
Vendor
CVE Published:
4 March 2025

What is CVE-2024-47262?

A race condition vulnerability in the VAPIX API param.cgi allows attackers to exploit the situation, potentially blocking access to the web interface of Axis devices. This security flaw was discovered by Dzmitry Lukyanenka as part of the AXIS OS Bug Bounty Program. It specifically affects attempts to interact with the param.cgi endpoint, while other API endpoints remain secure. Axis has issued security patches in recent AXIS OS releases, urging users to update their systems to mitigate this risk. For further details and remediation steps, refer to the Axis security advisory.

Affected Version(s)

AXIS OS 6.50.0 < 6.50.5.19

AXIS OS 7.0.0 < 8.40.66

AXIS OS 9.0.0 < 9.80.90

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.