CVE-2024-0066 Overview
CVE-2024-0066 affects the One-Click Cloud Connection (O3C) feature in AXIS OS, the operating system running on Axis network devices. Johan Fagerström, a member of the AXIS OS Bug Bounty Program, reported that the O3C feature may expose sensitive traffic between the Axis device client and the O3C server. The flaw is classified under CWE-319: Cleartext Transmission of Sensitive Information. The issue only applies when O3C is enabled and in use. Axis has released patched AXIS OS versions addressing the flaw.
Critical Impact
Network-positioned attackers can observe sensitive traffic between Axis devices and the O3C cloud service, potentially exposing confidential information transmitted by deployed cameras and edge devices.
Affected Products
- AXIS OS running on Axis network devices with O3C feature enabled
- Axis network cameras and edge devices using One-Click Cloud Connection
- Deployments where O3C client-server communication is active
Discovery Timeline
- Vulnerability reported by Johan Fagerström via the AXIS OS Bug Bounty Program
- 2024-06-18 - CVE-2024-0066 published to NVD
- 2026-04-15 - Last updated in NVD database
Technical Details for CVE-2024-0066
Vulnerability Analysis
The vulnerability stems from how the O3C feature transmits data between the Axis device and the O3C server. The implementation does not adequately protect sensitive traffic in transit, resulting in cleartext exposure of information that should remain confidential. The flaw maps to CWE-319, which covers cases where sensitive data is sent over a communication channel without proper cryptographic protection.
The weakness is limited in scope. Only deployments that activate and use O3C are affected. Devices configured without O3C are not exposed to this specific flaw. The impact is confined to confidentiality, with no direct effect on integrity or availability based on the published CVSS vector.
Root Cause
The root cause is improper handling of sensitive information during O3C client-server communication. Traffic that should be protected by end-to-end cryptographic controls is instead exposed in a manner accessible to an attacker with network visibility into the communication path. Axis has not publicly disclosed the specific protocol-level detail behind the flaw beyond the security advisory.
Attack Vector
The attack vector is network-based and requires no authentication or user interaction. An attacker positioned on a network segment that carries O3C traffic, such as an upstream link, can passively capture data exchanged between the Axis device and the cloud service. Refer to the Axis Security Advisory CVE-2024-0066 for vendor-specific technical detail.
No public proof-of-concept code is available, and no verified code examples exist for this issue. The vulnerability mechanism is therefore described in prose rather than reproduced as exploit code.
Detection Methods for CVE-2024-0066
Indicators of Compromise
- Unexpected plaintext traffic patterns originating from Axis devices toward O3C endpoints
- Network captures showing sensitive fields transmitted without TLS protection on O3C sessions
- Axis devices running unpatched AXIS OS firmware versions with O3C enabled
Detection Strategies
- Inventory all Axis devices and verify AXIS OS firmware version against the vendor advisory
- Inspect outbound traffic from camera VLANs to identify devices using O3C and confirm encryption
- Correlate firmware versions and O3C configuration state through centralized device management
Monitoring Recommendations
- Monitor egress traffic from IoT and camera network segments for unencrypted protocols
- Alert on Axis device firmware versions that fall below the patched AXIS OS releases
- Track configuration changes that enable O3C on previously isolated devices
How to Mitigate CVE-2024-0066
Immediate Actions Required
- Identify Axis devices with O3C enabled across the environment
- Upgrade affected devices to the patched AXIS OS versions listed in the Axis advisory
- If patching is delayed, disable the O3C feature on devices where it is not required
- Segment Axis devices onto dedicated VLANs with restricted egress paths
Patch Information
Axis has released patched AXIS OS versions that remediate CVE-2024-0066. Consult the Axis Security Advisory CVE-2024-0066 for the complete list of fixed firmware versions mapped to specific device models. Apply the firmware update through the standard Axis device management workflow.
Workarounds
- Disable the O3C feature on Axis devices that do not require cloud connectivity
- Restrict device network access to trusted segments until firmware updates are applied
- Route Axis device egress traffic through a network path that prevents third-party interception
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


