Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-15867 | Johan Fagerström, member of the AXIS OS Bug Bounty Program, has found that a O3C feature may expose sensitive traffic between the client (Axis device) and (O3C) server. If O3C is not being used this flaw does not apply. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution. |
Fri, 08 Nov 2024 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Axis
Axis axis Os Axis axis Os 2020 Axis axis Os 2022 |
|
| CPEs | cpe:2.3:o:axis:axis_os:5.51:*:*:*:*:*:*:* cpe:2.3:o:axis:axis_os_2020:*:*:*:*:lts:*:*:* cpe:2.3:o:axis:axis_os_2022:-:*:*:*:lts:*:*:* |
|
| Vendors & Products |
Axis
Axis axis Os Axis axis Os 2020 Axis axis Os 2022 |
|
| Metrics |
ssvc
|
Fri, 08 Nov 2024 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-319 |
Status: PUBLISHED
Assigner: Axis
Published:
Updated: 2024-11-08T08:50:35.312Z
Reserved: 2023-11-22T19:14:29.296Z
Link: CVE-2024-0066
Updated: 2024-08-01T17:41:15.624Z
Status : Deferred
Published: 2024-06-18T06:15:10.723
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-0066
No data.
OpenCVE Enrichment
No data.
EUVD