CVE-2024-26293
Description
The Avid Nexis Agent uses a vulnerable gSOAP version. An undocumented vulnerability impacting gSOAP v2.8 makes the application vulnerable to an Unauthenticated Path Traversal vulnerability. This issue affects Avid NEXIS E-series: before 2025.5.1; Avid NEXIS F-series: before 2025.5.1; Avid NEXIS PRO+: before 2025.5.1; System Director Appliance (SDA+): before 2025.5.1.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An unauthenticated path traversal vulnerability in Avid NEXIS Agent, due to a vulnerable gSOAP library, allows attackers to read arbitrary files on affected systems.
Vulnerability
Description
The Avid NEXIS Agent, used in NEXIS E-series, F-series, PRO+, and System Director Appliance (SDA+), is built with a vulnerable version (v2.8) of the gSOAP library [1]. An undocumented flaw in this gSOAP version is the root cause of the vulnerability [1]. This allows an attacker to perform an Unauthenticated Path Traversal attack, listed as CVE-2024-26293 [1]. The vulnerability affects all listed products before version 2025.5.1 [1].
Attack
Vector
The Path Traversal vulnerability can be exploited without any authentication [1]. An attacker would send a crafted HTTP request to the Avid NEXIS Agent's exposed gSOAP endpoint. By manipulating file path sequences in the request, the attacker can traverse outside of the intended web root directory. The vulnerability is exploitable on both Linux and Windows platforms [1].
Impact
Successful exploitation allows an unauthenticated attacker to read arbitrary files from the host filesystem [1]. This could lead to the disclosure of sensitive information such as configuration files, credentials, or other proprietary data stored on the NEXIS system.
Mitigation
Avid has released version 2025.5.1 which addresses this vulnerability [1]. Users should upgrade to this patched version as soon as possible. The vendor's advisory indicates that CVE-2024-26293 was included in the patches released at that time [1]. There are no known public workarounds for this specific issue.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <2025.5.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.