CVE-2024-47260

6.5 MEDIUM

📋 TL;DR

This vulnerability in Axis devices allows attackers to upload excessive audio clips through the VAPIX API mediaclip.cgi endpoint due to insufficient input validation. This can cause memory exhaustion, leading to device crashes or denial of service. All Axis devices running vulnerable AXIS OS versions with the VAPIX API enabled are affected.

💻 Affected Systems

Products:
  • Axis network cameras and video encoders with VAPIX API
Versions: AXIS OS versions before the patched releases (specific versions in Axis advisory)
Operating Systems: AXIS OS
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have VAPIX API enabled (typically enabled by default). The vulnerability affects the mediaclip.cgi endpoint specifically.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device memory exhaustion causing system crash, persistent denial of service requiring physical reset, and potential disruption of surveillance/security operations.

🟠

Likely Case

Device becomes unresponsive or crashes, requiring reboot to restore functionality, disrupting video surveillance and network services.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting who can access the VAPIX API endpoints.

🌐 Internet-Facing: HIGH if VAPIX API is exposed to the internet, as attackers can remotely trigger memory exhaustion without authentication.
🏢 Internal Only: MEDIUM if only accessible internally, but still poses risk from insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending multiple requests to the mediaclip.cgi endpoint. No authentication is required if the endpoint is accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Patched AXIS OS versions as specified in Axis security advisory

Vendor Advisory: https://www.axis.com/dam/public/1d/d3/ef/cve-2024-47260pdf-en-US-466883.pdf

Restart Required: Yes

Instructions:

1. Download patched AXIS OS version from Axis website. 2. Upload firmware to device via web interface. 3. Install update. 4. Reboot device. 5. Verify version is updated.

🔧 Temporary Workarounds

Disable VAPIX API

all

Disable the VAPIX API if not required for functionality

Network Access Control

all

Restrict network access to VAPIX API endpoints using firewall rules

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Axis devices from untrusted networks
  • Deploy network monitoring to detect excessive requests to mediaclip.cgi endpoint

🔍 How to Verify

Check if Vulnerable:

Check if device responds to requests to /axis-cgi/mediaclip.cgi and check AXIS OS version against vulnerable versions in advisory

Check Version:

Check device web interface or use VAPIX API: http://<device-ip>/axis-cgi/admin/param.cgi?action=list&group=Properties.Firmware.Version

Verify Fix Applied:

Verify AXIS OS version is updated to patched version and test that excessive uploads to mediaclip.cgi no longer cause memory issues

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed or successful POST requests to /axis-cgi/mediaclip.cgi
  • System log entries indicating memory exhaustion or device crashes

Network Indicators:

  • High volume of HTTP POST requests to mediaclip.cgi endpoint from single source
  • Unusual traffic patterns to Axis device management interfaces

SIEM Query:

source="axis_device" AND (uri_path="/axis-cgi/mediaclip.cgi" AND http_method="POST") | stats count by src_ip

🔗 References

📤 Share & Export