cve/2024/CVE-2024-26293.md

21 lines
1.3 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-26293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26293)
![](https://img.shields.io/static/v1?label=Product&message=Avid%20NEXIS%20E-series&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Avid%20NEXIS%20F-series&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Avid%20NEXIS%20PRO%2B&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=System%20Director%20Appliance%20(SDA%2B)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component&color=brightgreen)
### Description
The Avid Nexis Agent uses a vulnerable gSOAPversion. An undocumented vulnerability impacting gSOAP v2.8 makes the application vulnerable to an Unauthenticated Path Traversal vulnerability.This issue affects Avid NEXIS E-series: before 2025.5.1; Avid NEXIS F-series: before 2025.5.1; Avid NEXIS PRO+: before 2025.5.1; System Director Appliance (SDA+): before 2025.5.1.
### POC
#### Reference
- https://raeph123.github.io/BlogPosts/Avid_Nexis/Advisory_Avid_Nexus_Agent_Multiple_Vulnerabilities_en.html
#### Github
No PoCs found on GitHub currently.