VYPR
High severityNVD Advisory· Published Jul 14, 2025· Updated Apr 15, 2026

CVE-2024-26293

CVE-2024-26293

Description

The Avid Nexis Agent uses a vulnerable gSOAP version. An undocumented vulnerability impacting gSOAP v2.8 makes the application vulnerable to an Unauthenticated Path Traversal vulnerability. This issue affects Avid NEXIS E-series: before 2025.5.1; Avid NEXIS F-series: before 2025.5.1; Avid NEXIS PRO+: before 2025.5.1; System Director Appliance (SDA+): before 2025.5.1.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated path traversal vulnerability in Avid NEXIS Agent, due to a vulnerable gSOAP library, allows attackers to read arbitrary files on affected systems.

Vulnerability

Description

The Avid NEXIS Agent, used in NEXIS E-series, F-series, PRO+, and System Director Appliance (SDA+), is built with a vulnerable version (v2.8) of the gSOAP library [1]. An undocumented flaw in this gSOAP version is the root cause of the vulnerability [1]. This allows an attacker to perform an Unauthenticated Path Traversal attack, listed as CVE-2024-26293 [1]. The vulnerability affects all listed products before version 2025.5.1 [1].

Attack

Vector

The Path Traversal vulnerability can be exploited without any authentication [1]. An attacker would send a crafted HTTP request to the Avid NEXIS Agent's exposed gSOAP endpoint. By manipulating file path sequences in the request, the attacker can traverse outside of the intended web root directory. The vulnerability is exploitable on both Linux and Windows platforms [1].

Impact

Successful exploitation allows an unauthenticated attacker to read arbitrary files from the host filesystem [1]. This could lead to the disclosure of sensitive information such as configuration files, credentials, or other proprietary data stored on the NEXIS system.

Mitigation

Avid has released version 2025.5.1 which addresses this vulnerability [1]. Users should upgrade to this patched version as soon as possible. The vendor's advisory indicates that CVE-2024-26293 was included in the patches released at that time [1]. There are no known public workarounds for this specific issue.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.