CVE-2024-0066

Johan Fagerström, member of the AXIS OS Bug Bounty Program, has found that a O3C feature may expose sensitive traffic between the client (Axis device) and (O3C) server. If O3C is not being used this flaw does not apply. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Configurations

No configuration.

History

08 Nov 2024, 09:15

Type Values Removed Values Added
CWE CWE-319

20 Jun 2024, 12:44

Type Values Removed Values Added
Summary
  • (es) Johan Fagerström, miembro del programa AXIS OS Bug Bounty, descubrió que una característica de O3C puede exponer el tráfico confidencial entre el cliente (dispositivo Axis) y el servidor (O3C). Si no se utiliza O3C, este defecto no se aplica. Axis ha lanzado versiones parcheadas del sistema operativo AXIS para la falla resaltada. Consulte el aviso de seguridad de Axis para obtener más información y soluciones.

18 Jun 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-18 06:15

Updated : 2024-11-08 09:15


NVD link : CVE-2024-0066

Mitre link : CVE-2024-0066

CVE.ORG link : CVE-2024-0066


JSON object : View

Products Affected

No product.

CWE
CWE-319

Cleartext Transmission of Sensitive Information