{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-9524","assignerOrgId":"f2daf9a0-02c2-4b83-a01d-63b3b304b807","state":"PUBLISHED","assignerShortName":"Axis","dateReserved":"2025-08-27T05:23:55.357Z","datePublished":"2025-11-11T07:25:45.754Z","dateUpdated":"2025-11-14T17:54:18.966Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"AXIS OS","vendor":"Axis Communications AB","versions":[{"lessThan":"6.50.5.21","status":"affected","version":"6.50.0","versionType":"semver"},{"lessThan":"8.40.89","status":"affected","version":"7.0.0","versionType":"semver"},{"lessThan":"9.80.123","status":"affected","version":"9.0.0","versionType":"semver"},{"lessThan":"10.12.305","status":"affected","version":"10.0.0","versionType":"semver"},{"lessThan":"11.11.177","status":"affected","version":"11.0.0","versionType":"semver"},{"lessThan":"12.7.11","status":"affected","version":"12.0.0","versionType":"semver"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:axis_communications_ab:axis_os:*:*:*:*:*:*:*:*","versionEndExcluding":"6.50.5.21","versionStartIncluding":"6.50.0","vulnerable":true},{"criteria":"cpe:2.3:a:axis_communications_ab:axis_os:*:*:*:*:*:*:*:*","versionEndExcluding":"8.40.89","versionStartIncluding":"7.0.0","vulnerable":true},{"criteria":"cpe:2.3:a:axis_communications_ab:axis_os:*:*:*:*:*:*:*:*","versionEndExcluding":"9.80.123","versionStartIncluding":"9.0.0","vulnerable":true},{"criteria":"cpe:2.3:a:axis_communications_ab:axis_os:*:*:*:*:*:*:*:*","versionEndExcluding":"10.12.305","versionStartIncluding":"10.0.0","vulnerable":true},{"criteria":"cpe:2.3:a:axis_communications_ab:axis_os:*:*:*:*:*:*:*:*","versionEndExcluding":"11.11.177","versionStartIncluding":"11.0.0","vulnerable":true},{"criteria":"cpe:2.3:a:axis_communications_ab:axis_os:*:*:*:*:*:*:*:*","versionEndExcluding":"12.7.11","versionStartIncluding":"12.0.0","vulnerable":true}],"negate":false,"operator":"OR"}],"operator":"OR"}],"credits":[{"lang":"en","type":"finder","value":"Mucoze"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The VAPIX API <i>port.cgi</i> did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account."}],"value":"The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1287","description":"CWE-1287: Improper Validation of Specified Type of Input","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f2daf9a0-02c2-4b83-a01d-63b3b304b807","shortName":"Axis","dateUpdated":"2025-11-11T07:33:54.758Z"},"references":[{"url":"https://www.axis.com/dam/public/f1/f0/1e/cve-2025-9524pdf-en-US-504220.pdf"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-11-14T17:54:12.194729Z","id":"CVE-2025-9524","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-11-14T17:54:18.966Z"}}]}}