The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account.
Metrics
Affected Vendors & Products
References
History
Fri, 14 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Axis
Axis axis Os |
|
| Vendors & Products |
Axis
Axis axis Os |
Tue, 11 Nov 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account. | |
| Weaknesses | CWE-1287 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Axis
Published: 2025-11-11T07:25:45.754Z
Updated: 2025-11-14T17:54:18.966Z
Reserved: 2025-08-27T05:23:55.357Z
Link: CVE-2025-9524
Updated: 2025-11-14T17:54:15.571Z
Status : Awaiting Analysis
Published: 2025-11-11T08:15:35.213
Modified: 2025-11-12T16:19:34.210
Link: CVE-2025-9524
No data.