### [CVE-2024-26293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26293) ![](https://img.shields.io/static/v1?label=Product&message=Avid%20NEXIS%20E-series&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Avid%20NEXIS%20F-series&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Avid%20NEXIS%20PRO%2B&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=System%20Director%20Appliance%20(SDA%2B)&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1395%3A%20Dependency%20on%20Vulnerable%20Third-Party%20Component&color=brightgreen) ### Description The Avid Nexis Agent uses a vulnerable gSOAPversion. An undocumented vulnerability impacting gSOAP v2.8 makes the application vulnerable to an Unauthenticated Path Traversal vulnerability.This issue affects Avid NEXIS E-series: before 2025.5.1; Avid NEXIS F-series: before 2025.5.1; Avid NEXIS PRO+: before 2025.5.1; System Director Appliance (SDA+): before 2025.5.1. ### POC #### Reference - https://raeph123.github.io/BlogPosts/Avid_Nexis/Advisory_Avid_Nexus_Agent_Multiple_Vulnerabilities_en.html #### Github No PoCs found on GitHub currently.