Vulnerability Description
Johan Fagerström, member of the AXIS OS Bug Bounty Program, has found that a O3C feature may expose sensitive traffic between the client (Axis device) and (O3C) server. If O3C is not being used this flaw does not apply. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://www.axis.com/dam/public/03/49/2c/cve-2024-0066-en-US-442553.pdf
- https://www.axis.com/dam/public/03/49/2c/cve-2024-0066-en-US-442553.pdf
FAQ
What is CVE-2024-0066?
CVE-2024-0066 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Johan Fagerström, member of the AXIS OS Bug Bounty Program, has found that a O3C feature may expose sensitive traffic between the client (Axis device) and (O3C) server. If O3C is not being used this f...
How severe is CVE-2024-0066?
CVE-2024-0066 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-0066?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.