CVE-2024-47261

4.3 MEDIUM

📋 TL;DR

This vulnerability allows attackers to upload files via the VAPIX API uploadoverlayimage.cgi endpoint in Axis devices, potentially blocking access to create image overlays in the web interface. Attackers can exploit insufficient input validation to disrupt legitimate overlay functionality. This affects Axis devices with vulnerable VAPIX API implementations.

💻 Affected Systems

Products:
  • Axis devices with VAPIX API
Versions: Specific versions not detailed in provided reference; consult Axis advisory for exact ranges
Operating Systems: AXIS OS
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with VAPIX API enabled and accessible are vulnerable. Default configurations typically expose VAPIX endpoints.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of image overlay functionality for legitimate users, potentially disrupting surveillance monitoring capabilities that rely on overlays.

🟠

Likely Case

Temporary disruption of image overlay creation in the web interface until malicious files are removed.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting VAPIX API exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the VAPIX API endpoint but appears straightforward given the input validation weakness.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Axis advisory for specific fixed versions

Vendor Advisory: https://www.axis.com/dam/public/18/c5/b2/cve-2024-47261pdf-en-US-474505.pdf

Restart Required: Yes

Instructions:

1. Review Axis advisory for affected products and fixed firmware versions. 2. Download and install the latest firmware from Axis support portal. 3. Reboot the device after installation. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict VAPIX API Access

linux

Limit network access to VAPIX API endpoints using firewall rules or network segmentation.

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP

Disable Unused VAPIX Features

all

Disable VAPIX API or specific CGI endpoints if not required for device operation.

🧯 If You Can't Patch

  • Implement strict network access controls to limit VAPIX API exposure to trusted sources only.
  • Monitor for unauthorized file upload attempts and review device logs regularly for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check if the device is running a vulnerable firmware version by comparing against Axis advisory. Test access to uploadoverlayimage.cgi endpoint if authorized.

Check Version:

Check device web interface or use VAPIX API call: http://device-ip/axis-cgi/admin/param.cgi?action=list&group=Properties.Firmware.Version

Verify Fix Applied:

Verify firmware version matches or exceeds the patched version listed in Axis advisory. Test that file upload attempts via uploadoverlayimage.cgi are properly validated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload requests to uploadoverlayimage.cgi endpoint
  • Failed or successful overlay creation attempts from unexpected sources

Network Indicators:

  • HTTP POST requests to /axis-cgi/uploadoverlayimage.cgi from untrusted IPs
  • Unusual traffic patterns to VAPIX API ports

SIEM Query:

source="axis_device" AND url="*uploadoverlayimage.cgi*" AND (method="POST" OR status="200")

🔗 References

📤 Share & Export