<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/">
  <channel>
    <title>Axis Communications Firmware</title>
    <link>http://www.axis.com</link>
    <description>RSS feed listing the latest firmware releases for products from Axis Communications.</description>
    <image>
      <title>Axis Communications Firmware</title>
      <url>http://www.axis.com/core/graphics/axis_logo.gif</url>
      <link>http://www.axis.com</link>
      <width>96</width>
      <height>34</height>
    </image>
    <item>
      <title>AXIS A1710, version 12.7.61.2</title>
      <link>https://www.axis.com/support/firmware#c01281c78e00c971e85da7a11d894a36</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions according to instructions at&lt;br&gt;
https://help.axis.com/en-us/axis-os-knowledge-base#how-to-upgrade.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 12.7.61.2&lt;br&gt;
================================================================================&lt;br&gt;
12.7.61.2:F1&lt;br&gt;
Power monitoring page added to the device interface under the &#x22;Device&#x22; section.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 12.7.61.2&lt;br&gt;
================================================================================&lt;br&gt;
12.7.61.2:F3&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 12.7.61.2&lt;br&gt;
================================================================================&lt;br&gt;
12.7.61.2:L1&lt;br&gt;
Downgrading to an older AXIS OS version other than the latest supported 11.11LTS  or the 10.12LTS track release is not possible.&lt;br&gt;
&lt;br&gt;
12.7.61.2:L2&lt;br&gt;
Enforced of upgrade paths. More information can be found in AXIS OS Portal (https://help.axis.com/en-us/axis-os#upgrade-path).&lt;br&gt;
12.7.61.2:L3&lt;br&gt;
Changing firmware tracks between Secure Entry to VAPIX requires a factory default upgrade.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A1710 12.7.61.2</guid>
      <pubDate>Thu, 18 Dec 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A1810, version 12.7.61.2</title>
      <link>https://www.axis.com/support/firmware#8c11b7dba0847e52e1954439956cb5a5</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions according to instructions at&lt;br&gt;
https://help.axis.com/en-us/axis-os-knowledge-base#how-to-upgrade.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 12.7.61.2&lt;br&gt;
================================================================================&lt;br&gt;
12.7.61.2:F1&lt;br&gt;
Power monitoring page added to the device interface under the &#x22;Device&#x22; section.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 12.7.61.2&lt;br&gt;
================================================================================&lt;br&gt;
12.7.61.2:F3&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 12.7.61.2&lt;br&gt;
================================================================================&lt;br&gt;
12.7.61.2:L1&lt;br&gt;
Downgrading to an older AXIS OS version other than the latest supported 11.11LTS  or the 10.12LTS track release is not possible.&lt;br&gt;
&lt;br&gt;
12.7.61.2:L2&lt;br&gt;
Enforced of upgrade paths. More information can be found in AXIS OS Portal (https://help.axis.com/en-us/axis-os#upgrade-path).&lt;br&gt;
12.7.61.2:L3&lt;br&gt;
Changing firmware tracks between Secure Entry to VAPIX requires a factory default upgrade.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A1810 12.7.61.2</guid>
      <pubDate>Thu, 18 Dec 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS C1004-E, version 10.12.310.1</title>
      <link>https://www.axis.com/support/firmware#619318eb5edc2ff2d6c3585b7c9e9d00</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Features in 10.12.310.1&lt;br&gt;
=======================&lt;br&gt;
&lt;br&gt;
10.12.310.1:F1&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.310.1:F2&lt;br&gt;
OpenSSL Update to 1.1.1zd to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.310.1:F3&lt;br&gt;
Updated OpenSSH to version 10.1&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 10.12.310.1&lt;br&gt;
==========================&lt;br&gt;
&lt;br&gt;
10.12.310.1:C1&lt;br&gt;
Corrected a memory leak in the Axis parameter handler service.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C2&lt;br&gt;
Addressed CVE-2024-7784. Note that downgrading the product to an older AXIS OS version other than the latest supported 11.11 LTS or 10.12 LTS track release is not possible.&lt;br&gt;
For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C3&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more detailed information will follow then. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C4&lt;br&gt;
Addressed CVE-2025-8998. This CVE will be externally disclosed on 11 November, more detailed information will follow then. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C5&lt;br&gt;
Addressed CVE-2025-9055. This CVE will be externally disclosed on XXX, more detailed information will follow at that time. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 10.12.300.1&lt;br&gt;
=======================&lt;br&gt;
&lt;br&gt;
10.12.300.1:F1&lt;br&gt;
Updated cURL to version 8.14.1&lt;br&gt;
&lt;br&gt;
10.12.300.1:F2&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.300.1:F3&lt;br&gt;
Updated FFmpeg to version 4.4.6 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.300.1:F4&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">C1004-E 10.12.310.1</guid>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS C2005, version 10.12.310.1</title>
      <link>https://www.axis.com/support/firmware#619318eb5edc2ff2d6c3585b7c9e9d00</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Features in 10.12.310.1&lt;br&gt;
=======================&lt;br&gt;
&lt;br&gt;
10.12.310.1:F1&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.310.1:F2&lt;br&gt;
OpenSSL Update to 1.1.1zd to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.310.1:F3&lt;br&gt;
Updated OpenSSH to version 10.1&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 10.12.310.1&lt;br&gt;
==========================&lt;br&gt;
&lt;br&gt;
10.12.310.1:C1&lt;br&gt;
Corrected a memory leak in the Axis parameter handler service.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C2&lt;br&gt;
Addressed CVE-2024-7784. Note that downgrading the product to an older AXIS OS version other than the latest supported 11.11 LTS or 10.12 LTS track release is not possible.&lt;br&gt;
For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C3&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more detailed information will follow then. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C4&lt;br&gt;
Addressed CVE-2025-8998. This CVE will be externally disclosed on 11 November, more detailed information will follow then. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C5&lt;br&gt;
Addressed CVE-2025-9055. This CVE will be externally disclosed on XXX, more detailed information will follow at that time. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 10.12.300.1&lt;br&gt;
=======================&lt;br&gt;
&lt;br&gt;
10.12.300.1:F1&lt;br&gt;
Updated cURL to version 8.14.1&lt;br&gt;
&lt;br&gt;
10.12.300.1:F2&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.300.1:F3&lt;br&gt;
Updated FFmpeg to version 4.4.6 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.300.1:F4&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">C2005 10.12.310.1</guid>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS C3003-E, version 10.12.310.1</title>
      <link>https://www.axis.com/support/firmware#0254d620a236f2d8857a5b7e56d87102</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Features in 10.12.310.1&lt;br&gt;
=======================&lt;br&gt;
&lt;br&gt;
10.12.310.1:F1&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.310.1:F2&lt;br&gt;
OpenSSL Update to 1.1.1zd to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.310.1:F3&lt;br&gt;
Updated OpenSSH to version 10.1&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 10.12.310.1&lt;br&gt;
==========================&lt;br&gt;
&lt;br&gt;
10.12.310.1:C1&lt;br&gt;
Corrected a memory leak in the Axis parameter handler service.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C2&lt;br&gt;
Addressed CVE-2024-7784. Note that downgrading the product to an older AXIS OS version other than the latest supported 11.11 LTS or 10.12 LTS track release is not possible.&lt;br&gt;
For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C3&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more detailed information will follow then. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C4&lt;br&gt;
Addressed CVE-2025-8998. This CVE will be externally disclosed on 11 November, more detailed information will follow then. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C5&lt;br&gt;
Addressed CVE-2025-9055. This CVE will be externally disclosed on XXX, more detailed information will follow at that time. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 10.12.300.1&lt;br&gt;
=======================&lt;br&gt;
&lt;br&gt;
10.12.300.1:F1&lt;br&gt;
Updated cURL to version 8.14.1&lt;br&gt;
&lt;br&gt;
10.12.300.1:F2&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.300.1:F3&lt;br&gt;
Updated FFmpeg to version 4.4.6 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.300.1:F4&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">C3003-E 10.12.310.1</guid>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS C8033, version 10.12.310.1</title>
      <link>https://www.axis.com/support/firmware#8881b84e5caf262a674e85b955e17d84</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Features in 10.12.310.1&lt;br&gt;
=======================&lt;br&gt;
&lt;br&gt;
10.12.310.1:F1&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.310.1:F2&lt;br&gt;
OpenSSL Update to 1.1.1zd to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.310.1:F3&lt;br&gt;
Updated OpenSSH to version 10.1&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 10.12.310.1&lt;br&gt;
==========================&lt;br&gt;
&lt;br&gt;
10.12.310.1:C1&lt;br&gt;
Corrected a memory leak in the Axis parameter handler service.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C2&lt;br&gt;
Addressed CVE-2024-7784. Note that downgrading the product to an older AXIS OS version other than the latest supported 11.11 LTS or 10.12 LTS track release is not possible.&lt;br&gt;
For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C3&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more detailed information will follow then. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C4&lt;br&gt;
Addressed CVE-2025-8998. This CVE will be externally disclosed on 11 November, more detailed information will follow then. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
10.12.310.1:C5&lt;br&gt;
Addressed CVE-2025-9055. This CVE will be externally disclosed on XXX, more detailed information will follow at that time. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 10.12.300.1&lt;br&gt;
=======================&lt;br&gt;
&lt;br&gt;
10.12.300.1:F1&lt;br&gt;
Updated cURL to version 8.14.1&lt;br&gt;
&lt;br&gt;
10.12.300.1:F2&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.300.1:F3&lt;br&gt;
Updated FFmpeg to version 4.4.6 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
10.12.300.1:F4&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">C8033 10.12.310.1</guid>
      <pubDate>Mon, 24 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A1210, version 12.6.102.1</title>
      <link>https://www.axis.com/support/firmware#e46436048a0737167c15bd469876bcb6</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions according to instructions at&lt;br&gt;
https://help.axis.com/en-us/axis-os-knowledge-base#how-to-upgrade.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F1&lt;br&gt;
Door controller can be connected to A9910 for Elevator Control.&lt;br&gt;
&lt;br&gt;
12.6.102.1:F2&lt;br&gt;
Configured License plate verifier, Barcode reader and AXIS Intercom is visible on the reader section.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F3&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:L1&lt;br&gt;
Downgrading to an older AXIS OS version other than the latest supported 11.11LTS  or the 10.12LTS track release is not possible.&lt;br&gt;
&lt;br&gt;
12.6.102.1:L2&lt;br&gt;
Enforcement of upgrade paths. More information can be found in AXIS OS Portal (https://help.axis.com/en-us/axis-os#upgrade-path). &lt;br&gt;
&lt;br&gt;
12.6.102.1:L3&lt;br&gt;
Changing firmware tracks between Secure Entry to VAPIX, a factory default is required.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A1210 12.6.102.1</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A1210-B, version 12.6.102.1</title>
      <link>https://www.axis.com/support/firmware#e46436048a0737167c15bd469876bcb6</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions according to instructions at&lt;br&gt;
https://help.axis.com/en-us/axis-os-knowledge-base#how-to-upgrade.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F1&lt;br&gt;
Door controller can be connected to A9910 for Elevator Control.&lt;br&gt;
&lt;br&gt;
12.6.102.1:F2&lt;br&gt;
Configured License plate verifier, Barcode reader and AXIS Intercom is visible on the reader section.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F3&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:L1&lt;br&gt;
Downgrading to an older AXIS OS version other than the latest supported 11.11LTS  or the 10.12LTS track release is not possible.&lt;br&gt;
&lt;br&gt;
12.6.102.1:L2&lt;br&gt;
Enforcement of upgrade paths. More information can be found in AXIS OS Portal (https://help.axis.com/en-us/axis-os#upgrade-path). &lt;br&gt;
&lt;br&gt;
12.6.102.1:L3&lt;br&gt;
Changing firmware tracks between Secure Entry to VAPIX, a factory default is required.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A1210-B 12.6.102.1</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A1601, version 12.6.102.1</title>
      <link>https://www.axis.com/support/firmware#e55232c38185a94c2de8d57073ae4338</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions according to instructions at&lt;br&gt;
https://help.axis.com/en-us/axis-os-knowledge-base#how-to-upgrade.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F1&lt;br&gt;
Configured License plate verifier, Barcode reader and AXIS Intercom is visible on the reader section.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F3&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:L1&lt;br&gt;
No support for Elevator control and cannot add A9910 to A1601&lt;br&gt;
&lt;br&gt;
12.6.102.1:L2&lt;br&gt;
Downgrading to an older AXIS OS version other than the latest supported 11.11LTS  or the 10.12LTS track release is not possible.&lt;br&gt;
&lt;br&gt;
12.6.102.1:L3&lt;br&gt;
Enforcement of upgrade paths. More information can be found in AXIS OS Portal (https://help.axis.com/en-us/axis-os#upgrade-path). &lt;br&gt;
&lt;br&gt;
12.6.102.1:L4&lt;br&gt;
Changing firmware tracks between Secure Entry to VAPIX, a factory default is required.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A1601 12.6.102.1</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A1610, version 12.6.102.1</title>
      <link>https://www.axis.com/support/firmware#3cfdd7bc62625f4f9f587d9ddbc54221</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions according to instructions at&lt;br&gt;
https://help.axis.com/en-us/axis-os-knowledge-base#how-to-upgrade.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F1&lt;br&gt;
Door controller can be connected to A9910 for Elevator Control.&lt;br&gt;
&lt;br&gt;
12.6.102.1:F2&lt;br&gt;
Configured License plate verifier, Barcode reader and AXIS Intercom is visible on the reader section.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F1&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:L1&lt;br&gt;
Downgrading to an older AXIS OS version other than the latest supported 11.11LTS  or the 10.12LTS track release is not possible.&lt;br&gt;
&lt;br&gt;
12.6.102.1:L2&lt;br&gt;
Enforcement of upgrade paths. More information can be found in AXIS OS Portal (https://help.axis.com/en-us/axis-os#upgrade-path). &lt;br&gt;
&lt;br&gt;
12.6.102.1:L3&lt;br&gt;
Changing firmware tracks between Secure Entry to VAPIX, a factory default is required.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A1610 12.6.102.1</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A1610-B, version 12.6.102.1</title>
      <link>https://www.axis.com/support/firmware#3cfdd7bc62625f4f9f587d9ddbc54221</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions according to instructions at&lt;br&gt;
https://help.axis.com/en-us/axis-os-knowledge-base#how-to-upgrade.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F1&lt;br&gt;
Door controller can be connected to A9910 for Elevator Control.&lt;br&gt;
&lt;br&gt;
12.6.102.1:F2&lt;br&gt;
Configured License plate verifier, Barcode reader and AXIS Intercom is visible on the reader section.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:F1&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 12.6.102.1&lt;br&gt;
================================================================================&lt;br&gt;
12.6.102.1:L1&lt;br&gt;
Downgrading to an older AXIS OS version other than the latest supported 11.11LTS  or the 10.12LTS track release is not possible.&lt;br&gt;
&lt;br&gt;
12.6.102.1:L2&lt;br&gt;
Enforcement of upgrade paths. More information can be found in AXIS OS Portal (https://help.axis.com/en-us/axis-os#upgrade-path). &lt;br&gt;
&lt;br&gt;
12.6.102.1:L3&lt;br&gt;
Changing firmware tracks between Secure Entry to VAPIX, a factory default is required.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A1610-B 12.6.102.1</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A9910, version 1.4.6</title>
      <link>https://www.axis.com/support/firmware#8ab0a459b42c340941d9544512cfbf39</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions according to instructions at&lt;br&gt;
https://help.axis.com/en-us/axis-os-knowledge-base#how-to-upgrade.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 1.4.6&lt;br&gt;
================================================================================&lt;br&gt;
1.4.6:F1&lt;br&gt;
A9910 can be added to the Door Controller from FW 12.6.102.1 for Elevator control.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 1.4.6&lt;br&gt;
================================================================================ &lt;br&gt;
1.4.6:C1&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 1.4.6&lt;br&gt;
================================================================================&lt;br&gt;
1.4.6:L1&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A9910 1.4.6</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Axis_body_worn_system, version </title>
      <link>https://www.axis.com/support/firmware#2f57ee627f1993304561436cf0a5d0d5</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
New features in 12.7.53 since 12.6.87&lt;br&gt;
=======================================&lt;br&gt;
* Added support for alerting a wearer when entering a privacy zone. Requires AXIS W401 Body Worn Activation Kit&lt;br&gt;
* Added support for activating a live stream when starting a recording&lt;br&gt;
* Added support for remotely start a live stream in AXIS Body Worn Live Self-hosted, with options &#x22;While recording&#x22; or &#x22;Always&#x22;&lt;br&gt;
* Added support for viewing wearer location on a map without starting a live stream in AXIS Body Worn Live Self-hosted&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 12.7.53 since 12.6.87&lt;br&gt;
=======================================&lt;br&gt;
* Improved cleanup of old stray folders preventing factory defaulting an extension SCU&lt;br&gt;
* Improved BWC MMI when failing to connect to Wi-Fi&lt;br&gt;
* Aligned periodic reminder feedback with alerts&lt;br&gt;
* Fixed an issue where storage error was not shown during light up in silent mode&lt;br&gt;
* Fixed an issue where an extension SCU in evaluation mode could not be reset&lt;br&gt;
* Fixed an issue where W101 was not connecting to AXIS Body Worn Live Axis-Hosted when always connect was enabled &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Other updates in 12.7.53 since 12.6.87&lt;br&gt;
=======================================&lt;br&gt;
* Updated Curl to version 8.16.0 to increase overall cybersecurity level&lt;br&gt;
* Updated OpenSSL to version 3.0.18 to increase overall cybersecurity level&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
New features in 12.6.87 since 12.5.56&lt;br&gt;
=======================================&lt;br&gt;
* Remotely start a live stream in AXIS Body Worn Live Axis-hosted, with options &#x22;While recording&#x22; or &#x22;Always&#x22;&lt;br&gt;
* View wearer location on a map without starting a live stream in AXIS Body Worn Live Axis-hosted&lt;br&gt;
* BWCs that entered safe mode can now automatically reconnect to the body worn system. This is an opt-out&lt;br&gt;
* BWCs will now issue a warning when the holster sensor connection is lost&lt;br&gt;
* Added support for export/import of Genetec Clearance users using a CSV file&lt;br&gt;
* Added support for manually adding an existing Genetec Clearance user&lt;br&gt;
* Added support for starting a live stream when fall detection has been triggered on older camera models (W100/W101)&lt;br&gt;
* View live streams and wearer location in the AXIS Body Worn Assistant mobile app, supported through AXIS Body Worn Live Axis-hosted&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Axis_body_worn_system </guid>
      <pubDate>Tue, 04 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q3708-PVE, version 6.55.12</title>
      <link>https://www.axis.com/support/firmware#5de3166d7f12f28fac2415fe03d1751f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.55.12 since 6.55.11&lt;br&gt;
=======================================&lt;br&gt;
6.55.12:C01&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
6.55.12:C02&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.55.12:C03&lt;br&gt;
Updated OpenSSH to version 10.0p1.&lt;br&gt;
&lt;br&gt;
6.55.12:C04&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.55.12:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null characters.&lt;br&gt;
&lt;br&gt;
6.55.12:C06&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.55.12:C07&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.55.12:C08&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more detailed information will follow then. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.55.12:C09&lt;br&gt;
Addressed CVE-2024-47262. This CVE will be externally disclosed on 4 March 2025. More detailed information will follow at that time. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.55.12:C10&lt;br&gt;
Updated CURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.55.12:C11&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more detailed information will follow at that time. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q3708-PVE 6.55.12</guid>
      <pubDate>Mon, 03 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q3709-PVE, version 5.75.1.15</title>
      <link>https://www.axis.com/support/firmware#54919461c94bcca7329acc1738cc4182</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
Corrections in 5.75.1.15 since 5.75.1.14&lt;br&gt;
=========================================&lt;br&gt;
5.75.1.15:C01&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
5.75.1.15:C02&lt;br&gt;
Updated CURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
5.75.1.15:C03&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall minimum cyber security level.&lt;br&gt;
&lt;br&gt;
5.75.1.15:C04&lt;br&gt;
Updated OpenSSH to version 10.0p1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
5.75.1.15:C05&lt;br&gt;
Corrected CVE-2018-25032.&lt;br&gt;
&lt;br&gt;
5.75.1.15:C06&lt;br&gt;
Addressed CVE-2024-47262. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&lt;br&gt;
&lt;br&gt;
5.75.1.15:C07&lt;br&gt;
Addressed CVE-2025-0325. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&lt;br&gt;
&lt;br&gt;
5.75.1.15:C08&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
5.75.1.15:C09&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more detailed information will follow at that time.&lt;br&gt;
For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&lt;br&gt;
&lt;br&gt;
5.75.1.15:C10&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q3709-PVE 5.75.1.15</guid>
      <pubDate>Mon, 03 Nov 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS F34, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#c31e42477929478c64313032dec3789a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">F34 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS F44_Dual_Audio_Input, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#4c508c147c6ff850947548eb748276b3</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">F44_Dual_Audio_Input 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS M1145, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#53379538b0e2410ed59b463f2562e1a7</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M1145 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS M1145-L, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#53379538b0e2410ed59b463f2562e1a7</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M1145-L 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS M7011, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#5ce5cbbff2a97545c30da2264209c3a4</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M7011 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P3367, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#177a0afb6aea3c41846e30cd4aab6d61</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3367 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P5414-E, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#1b63ba85949a84cf254c50213c8099ec</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P5414-E 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P5415-E, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#1b63ba85949a84cf254c50213c8099ec</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P5415-E 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P8804, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#c31e42477929478c64313032dec3789a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P8804 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P8804-2, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#c31e42477929478c64313032dec3789a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P8804-2 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q2901, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#ad824f18c016e06056b560a252cbb6db</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q2901 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q2901-E, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#9a4e075f800ef0cb7b98e2a34198a02f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q2901-E 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q2901-E_PT_Mount, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#702ee5248a140a2f18ac63f8e853fa98</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q2901-E_PT_Mount 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q6128-E, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#7d27684e8ee536ea55c2ffa0655d221c</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6128-E 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q7411, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#640444abe258d11ebb37858d5b670846</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q7411 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q7436, version 6.50.5.21</title>
      <link>https://www.axis.com/support/firmware#df107c3660bf2ae804a2570a261a295c</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.21 since 6.50.5.20&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.21:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C02&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C03&lt;br&gt;
Addressed CVE-2025-0325. This CVE will be externally disclosed on 2 June 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C04&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C05&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C06&lt;br&gt;
Addressed [CVE-2025-32728](https://www.cve.org/CVERecord?id=CVE-2025-32728) in&lt;br&gt;
openssh-9.9p2&lt;br&gt;
&lt;br&gt;
6.50.5.21:C07&lt;br&gt;
Updated OpenSSH to version 10.0p1&lt;br&gt;
&lt;br&gt;
6.50.5.21:C08&lt;br&gt;
Corrected an issue where SMTP DATA messages did include additional not needed null&lt;br&gt;
characters.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C09&lt;br&gt;
Updated OpenSSL to version 1.1.1zc to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C10&lt;br&gt;
Updated Apache to version 2.4.65 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C11&lt;br&gt;
Updated cURL to version 8.16.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.21:C12&lt;br&gt;
Addressed CVE-2025-9524. This CVE will be externally disclosed on 11 November 2025, more&lt;br&gt;
detailed information will follow then. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q7436 6.50.5.21</guid>
      <pubDate>Mon, 20 Oct 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS A9210, version 12.5.72.1</title>
      <link>https://www.axis.com/support/firmware#ed740582408f63003ccbcb495e0ee140</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions given in howtoupgrade.txt,&lt;br&gt;
which is included in the firmware folder or according to instructions at&lt;br&gt;
https://www.axis.com/support/firmware.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 12.5.72.1&lt;br&gt;
================================================================================&lt;br&gt;
12.5.72.1:F1&lt;br&gt;
Platform upgrade from 12.0 to 12.5&lt;br&gt;
&lt;br&gt;
12.5.72.1:F2&lt;br&gt;
Improvements to Modbus support&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 12.5.72.1&lt;br&gt;
================================================================================&lt;br&gt;
12.5.72.1:C1&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 12.5.72.1&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A9210 12.5.72.1</guid>
      <pubDate>Mon, 25 Aug 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS S2208_Mk_II, version 2.1.0</title>
      <link>https://www.axis.com/support/firmware#1c3addaa96b77006de7d630f470002d0</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Version 2.1.0&lt;br&gt;
=========================&lt;br&gt;
* New Features&lt;br&gt;
- Added running configuration functionality.&lt;br&gt;
- Implemented login brute-force protection with temporary user lockout.&lt;br&gt;
- Support for clearing individual DHCP leases.&lt;br&gt;
&lt;br&gt;
* Other &lt;br&gt;
- Rebooting page now displayed during restart.&lt;br&gt;
- Warning toast shown when web interface loses connection to the switch.&lt;br&gt;
- New &#xE2;&#x80;&#x9C;Lock all ports&#xE2;&#x80;&#x9D; dropdown option.&lt;br&gt;
- New &#x22;PoE ports state&#xE2;&#x80;&#x9D; dropdown option.&lt;br&gt;
- Abnormal RTC events logged.&lt;br&gt;
- Online user manual access added.&lt;br&gt;
- Offline user manual updated.&lt;br&gt;
- Default PoE power allocation is set to LLDP-MED.&lt;br&gt;
- Security improvements.&lt;br&gt;
&lt;br&gt;
* Bug Fixes&lt;br&gt;
- Fixed issue where red LED remained on after PD device disconnection.&lt;br&gt;
- Added missing IP and device fields in system report (switch controller section).&lt;br&gt;
- Uplink port information included in system report.&lt;br&gt;
- Resolved minor UI issues.&lt;br&gt;
&lt;br&gt;
* Limitations&lt;br&gt;
  - Multiple Languages&lt;br&gt;
      Refreshing the page will show English temporary and then change to chosen one dynamically.&lt;br&gt;
  - Configurations&lt;br&gt;
      Network Settings - Management only allows to be configured as static IP.&lt;br&gt;
  - SSL Certification&lt;br&gt;
      The uploaded SSL certification will only take effect after reboot.&lt;br&gt;
&lt;br&gt;
Version 2.0.1&lt;br&gt;
=========================&lt;br&gt;
* First official release&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">S2208_Mk_II 2.1.0</guid>
      <pubDate>Thu, 21 Aug 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS S2212_Mk_II, version 2.1.0</title>
      <link>https://www.axis.com/support/firmware#1c3addaa96b77006de7d630f470002d0</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Version 2.1.0&lt;br&gt;
=========================&lt;br&gt;
* New Features&lt;br&gt;
- Added running configuration functionality.&lt;br&gt;
- Implemented login brute-force protection with temporary user lockout.&lt;br&gt;
- Support for clearing individual DHCP leases.&lt;br&gt;
&lt;br&gt;
* Other &lt;br&gt;
- Rebooting page now displayed during restart.&lt;br&gt;
- Warning toast shown when web interface loses connection to the switch.&lt;br&gt;
- New &#xE2;&#x80;&#x9C;Lock all ports&#xE2;&#x80;&#x9D; dropdown option.&lt;br&gt;
- New &#x22;PoE ports state&#xE2;&#x80;&#x9D; dropdown option.&lt;br&gt;
- Abnormal RTC events logged.&lt;br&gt;
- Online user manual access added.&lt;br&gt;
- Offline user manual updated.&lt;br&gt;
- Default PoE power allocation is set to LLDP-MED.&lt;br&gt;
- Security improvements.&lt;br&gt;
&lt;br&gt;
* Bug Fixes&lt;br&gt;
- Fixed issue where red LED remained on after PD device disconnection.&lt;br&gt;
- Added missing IP and device fields in system report (switch controller section).&lt;br&gt;
- Uplink port information included in system report.&lt;br&gt;
- Resolved minor UI issues.&lt;br&gt;
&lt;br&gt;
* Limitations&lt;br&gt;
  - Multiple Languages&lt;br&gt;
      Refreshing the page will show English temporary and then change to chosen one dynamically.&lt;br&gt;
  - Configurations&lt;br&gt;
      Network Settings - Management only allows to be configured as static IP.&lt;br&gt;
  - SSL Certification&lt;br&gt;
      The uploaded SSL certification will only take effect after reboot.&lt;br&gt;
&lt;br&gt;
Version 2.0.1&lt;br&gt;
=========================&lt;br&gt;
* First official release&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">S2212_Mk_II 2.1.0</guid>
      <pubDate>Thu, 21 Aug 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS S2216_Mk_II, version 2.1.0</title>
      <link>https://www.axis.com/support/firmware#1c3addaa96b77006de7d630f470002d0</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Version 2.1.0&lt;br&gt;
=========================&lt;br&gt;
* New Features&lt;br&gt;
- Added running configuration functionality.&lt;br&gt;
- Implemented login brute-force protection with temporary user lockout.&lt;br&gt;
- Support for clearing individual DHCP leases.&lt;br&gt;
&lt;br&gt;
* Other &lt;br&gt;
- Rebooting page now displayed during restart.&lt;br&gt;
- Warning toast shown when web interface loses connection to the switch.&lt;br&gt;
- New &#xE2;&#x80;&#x9C;Lock all ports&#xE2;&#x80;&#x9D; dropdown option.&lt;br&gt;
- New &#x22;PoE ports state&#xE2;&#x80;&#x9D; dropdown option.&lt;br&gt;
- Abnormal RTC events logged.&lt;br&gt;
- Online user manual access added.&lt;br&gt;
- Offline user manual updated.&lt;br&gt;
- Default PoE power allocation is set to LLDP-MED.&lt;br&gt;
- Security improvements.&lt;br&gt;
&lt;br&gt;
* Bug Fixes&lt;br&gt;
- Fixed issue where red LED remained on after PD device disconnection.&lt;br&gt;
- Added missing IP and device fields in system report (switch controller section).&lt;br&gt;
- Uplink port information included in system report.&lt;br&gt;
- Resolved minor UI issues.&lt;br&gt;
&lt;br&gt;
* Limitations&lt;br&gt;
  - Multiple Languages&lt;br&gt;
      Refreshing the page will show English temporary and then change to chosen one dynamically.&lt;br&gt;
  - Configurations&lt;br&gt;
      Network Settings - Management only allows to be configured as static IP.&lt;br&gt;
  - SSL Certification&lt;br&gt;
      The uploaded SSL certification will only take effect after reboot.&lt;br&gt;
&lt;br&gt;
Version 2.0.1&lt;br&gt;
=========================&lt;br&gt;
* First official release&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">S2216_Mk_II 2.1.0</guid>
      <pubDate>Thu, 21 Aug 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS S2224_Mk_II, version 2.1.0</title>
      <link>https://www.axis.com/support/firmware#1c3addaa96b77006de7d630f470002d0</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Version 2.1.0&lt;br&gt;
=========================&lt;br&gt;
* New Features&lt;br&gt;
- Added running configuration functionality.&lt;br&gt;
- Implemented login brute-force protection with temporary user lockout.&lt;br&gt;
- Support for clearing individual DHCP leases.&lt;br&gt;
&lt;br&gt;
* Other &lt;br&gt;
- Rebooting page now displayed during restart.&lt;br&gt;
- Warning toast shown when web interface loses connection to the switch.&lt;br&gt;
- New &#xE2;&#x80;&#x9C;Lock all ports&#xE2;&#x80;&#x9D; dropdown option.&lt;br&gt;
- New &#x22;PoE ports state&#xE2;&#x80;&#x9D; dropdown option.&lt;br&gt;
- Abnormal RTC events logged.&lt;br&gt;
- Online user manual access added.&lt;br&gt;
- Offline user manual updated.&lt;br&gt;
- Default PoE power allocation is set to LLDP-MED.&lt;br&gt;
- Security improvements.&lt;br&gt;
&lt;br&gt;
* Bug Fixes&lt;br&gt;
- Fixed issue where red LED remained on after PD device disconnection.&lt;br&gt;
- Added missing IP and device fields in system report (switch controller section).&lt;br&gt;
- Uplink port information included in system report.&lt;br&gt;
- Resolved minor UI issues.&lt;br&gt;
&lt;br&gt;
* Limitations&lt;br&gt;
  - Multiple Languages&lt;br&gt;
      Refreshing the page will show English temporary and then change to chosen one dynamically.&lt;br&gt;
  - Configurations&lt;br&gt;
      Network Settings - Management only allows to be configured as static IP.&lt;br&gt;
  - SSL Certification&lt;br&gt;
      The uploaded SSL certification will only take effect after reboot.&lt;br&gt;
&lt;br&gt;
Version 2.0.1&lt;br&gt;
=========================&lt;br&gt;
* First official release&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">S2224_Mk_II 2.1.0</guid>
      <pubDate>Thu, 21 Aug 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS A4612, version 2.48.0</title>
      <link>https://www.axis.com/support/firmware#73e57d86c4657f95342f2f74335d5e61</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 2.48.0&lt;br&gt;
================================================================================&lt;br&gt;
2.48.0:F1&lt;br&gt;
Security relay configuration with the Active output&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 2.48.0&lt;br&gt;
================================================================================ &lt;br&gt;
2.48.0:C1&lt;br&gt;
Improved certificate handling.&lt;br&gt;
&lt;br&gt;
2.48.0:C2&lt;br&gt;
Minor bug fixes and stability improvements.&lt;br&gt;
&lt;br&gt;
2.48.0:C3&lt;br&gt;
Changing the web interface password now requires entering the current password.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 2.48.0&lt;br&gt;
================================================================================&lt;br&gt;
2.48.0:L1&lt;br&gt;
Devices can no longer be downgraded below version 2.47.0 after updating.&lt;br&gt;
&lt;br&gt;
2.48.0:L2&lt;br&gt;
Devices no longer accept certificates signed with 1024-bit RSA keys.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A4612 2.48.0</guid>
      <pubDate>Thu, 07 Aug 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS A4020-E, version 1.1.12</title>
      <link>https://www.axis.com/support/firmware#94773e4e8befc306b31e49eccca1077f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 1.1.12&lt;br&gt;
================================================================================&lt;br&gt;
1.1.12:F1&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 1.1.12&lt;br&gt;
================================================================================ &lt;br&gt;
1.1.12:C1&lt;br&gt;
Stability improvements&lt;br&gt;
&lt;br&gt;
1.1.12:C2&lt;br&gt;
CVE-2024-49195 is solved&lt;br&gt;
&lt;br&gt;
1.1.12:C3&lt;br&gt;
CVE-2024-45157 is solved&lt;br&gt;
&lt;br&gt;
1.1.12:C4&lt;br&gt;
CVE-2024-45159 is solved&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 1.1.12&lt;br&gt;
================================================================================&lt;br&gt;
1.1.12:L1&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A4020-E 1.1.12</guid>
      <pubDate>Fri, 11 Jul 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS A4120-E, version 1.1.12</title>
      <link>https://www.axis.com/support/firmware#94773e4e8befc306b31e49eccca1077f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 1.1.12&lt;br&gt;
================================================================================&lt;br&gt;
1.1.12:F1&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 1.1.12&lt;br&gt;
================================================================================ &lt;br&gt;
1.1.12:C1&lt;br&gt;
Stability improvements&lt;br&gt;
&lt;br&gt;
1.1.12:C2&lt;br&gt;
CVE-2024-49195 is solved&lt;br&gt;
&lt;br&gt;
1.1.12:C3&lt;br&gt;
CVE-2024-45157 is solved&lt;br&gt;
&lt;br&gt;
1.1.12:C4&lt;br&gt;
CVE-2024-45159 is solved&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 1.1.12&lt;br&gt;
================================================================================&lt;br&gt;
1.1.12:L1&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A4120-E 1.1.12</guid>
      <pubDate>Fri, 11 Jul 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS V5914, version 8.45.4.5</title>
      <link>https://www.axis.com/support/firmware#ec98dff5ccd865c920b6ea4f11f8eb80</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
BEFORE upgrading from 5.75.1.13 please note the following IMPORTANT INFORMATION:&lt;br&gt;
As this is a very large step in Firmware versions, a Factory Default or&lt;br&gt;
Factory Restore of the camera is required after the update in order to ensure &lt;br&gt;
full functionality.&lt;br&gt;
This can be done via the web interface. Go to Settings &#x3E; Sytem &#x3E; Maintenance.&lt;br&gt;
More information on performing a Factory Reset can be found in the User Manual.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Updates 8.45.4.5 since 8.45.4.4&lt;br&gt;
================================================&lt;br&gt;
Features: &lt;br&gt;
&lt;br&gt;
8.45.4.5:F01&lt;br&gt;
Updated the End User License Agreement.&lt;br&gt;
&lt;br&gt;
Cybersecurity:  &lt;br&gt;
&lt;br&gt;
8.45.4.5:S01&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
8.45.4.5:S02&lt;br&gt;
Updated OpenSSL to version 1.1.1zb to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.5:S03&lt;br&gt;
Updated cURL to version 8.12.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S04&lt;br&gt;
Addressed CVE-2025-0325. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.5:S05&lt;br&gt;
Addressed CVE-2024-47262. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.5:S06&lt;br&gt;
Updated wpa-supplicant to version 2.11 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
Corrections:&lt;br&gt;
8.45.4.5:C01&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
8.45.4.5:C02&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
8.45.4.5:C03&lt;br&gt;
Improved stability and reliability of the certificate management service.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Updates 8.45.4.4 since 8.45.4.3&lt;br&gt;
================================================&lt;br&gt;
Cybersecurity:  &lt;br&gt;
&lt;br&gt;
8.45.4.4:S01&lt;br&gt;
Updated Apache to version 2.4.62 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S02&lt;br&gt;
Updated OpenSSL to version 1.1.1y to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S03&lt;br&gt;
Updated OpenSSH to version 9.8p1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S04&lt;br&gt;
Updated cURL to version 8.9.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S05&lt;br&gt;
Updated libssh2 to version 1.11.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S06&lt;br&gt;
Updated Nettle cryptographic library to version 3.6 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S07&lt;br&gt;
Addressed vulnerability allowing unauthorized command execution via param.cgi.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S08&lt;br&gt;
Addressed a vulnerability allowing DHCPv6 lease injection through unvalidated input parameters.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S09&lt;br&gt;
Addressed vulnerabilities in GnuTLS: CVE-2024-28834 and CVE-2024-28835.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S10&lt;br&gt;
Addressed CVE-2023-52160 in wpa-supplicant to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S11&lt;br&gt;
Addressed CVE-2024-0067, CVE-2024-6173, CVE-2024-6509. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S12&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S13&lt;br&gt;
The parameter RemoteService.ProxyPassword that controls the proxy password has been masked and made unreadable for security reasons.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S14&lt;br&gt;
Addressed CVE-2024-0054. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S15&lt;br&gt;
Addressed CVE-2023-5800. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
Corrections:&lt;br&gt;
&lt;br&gt;
8.45.4.4:C01&lt;br&gt;
Resolved an issue where SSH users could retain access after a factory default with kept IP settings.&lt;br&gt;
&lt;br&gt;
8.45.4.4:C02&lt;br&gt;
Corrected a stream crash caused by invalid float values in CGI input.&lt;br&gt;
&lt;br&gt;
8.45.4.4:C03&lt;br&gt;
Implemented DNS cache for O3C client to reduce DNS lookups.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Updates 8.45.4.3 since 8.45.4.2&lt;br&gt;
================================================&lt;br&gt;
Features: &lt;br&gt;
&lt;br&gt;
8.45.4.3:F01&lt;br&gt;
Improved UPnP compliance by updating the SSDP (Simple Service Discovery Protocol) SERVER header in the standard &#x22;OS/version UPnP/1.0 product/version&#x22; format and USN (Unique Service Name) field with a UUID in the standard format. This enhances consistency and compatibility.&lt;br&gt;
&lt;br&gt;
8.45.4.3:F02&lt;br&gt;
Improved the manager client certificates and added support for installing multiple trust certificates and requesting/installing a second client certificate.&lt;br&gt;
&lt;br&gt;
Cybersecurity:  &lt;br&gt;
&lt;br&gt;
8.45.4.3:S01&lt;br&gt;
Updated CURL to version 8.4.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S02&lt;br&gt;
Updated OpenSSL to version 1.1.1w to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S03&lt;br&gt;
Updated Apache to version 2.4.57 to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S04&lt;br&gt;
Receiving ICMP secure redirects from other network hosts are now disabled to increase overall minimum cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S05&lt;br&gt;
Addressed CVE-2023-21418. For more information, please visit https://www.axis.com/support/cybersecurity/vulnerability-management.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S06&lt;br&gt;
Addressed CVE-2023-21415. For more information, please visit https://www.axis.com/support/cybersecurity/vulnerability-management.&lt;br&gt;
&lt;br&gt;
Corrections:&lt;br&gt;
&lt;br&gt;
8.45.4.3:C01&lt;br&gt;
Netd Service preserves the static resolver configuration even after a soft restore, safeguarding static DNS/Search domain settings.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C02&lt;br&gt;
Corrected an issue with OAK (owner authentication key). It now only produces warnings in the log instead of errors if the device is not able to connect to the internet.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C04&lt;br&gt;
Improved stability of syslog system by addressing a potential memory leak.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C05&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis- cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C06&lt;br&gt;
Updated libupnp to version 1.14.16, solving a memory leak and improving overall stability.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C07&lt;br&gt;
Corrected an issue with certificate parsing during certificate uploads.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.4.2 since 8.45.4.1&lt;br&gt;
=======================================&lt;br&gt;
8.45.4.2:C01&lt;br&gt;
Updated cURL to version 7.86.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.4.1 since 8.45.4&lt;br&gt;
=======================================&lt;br&gt;
8.45.4.1:C01&lt;br&gt;
Updated OpenSSL to version 1.1.1q to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.1:C02&lt;br&gt;
Updated curl to version 7.84.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.4 since 8.45.3.3&lt;br&gt;
=======================================&lt;br&gt;
8.45.4:C01&lt;br&gt;
Updated OpenSSL to version 1.1.1o to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4:C02&lt;br&gt;
Updated Apache web server to version 2.4.54 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.3.3 since 8.45.3.2&lt;br&gt;
=======================================&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C01&lt;br&gt;
General improvements to the 2018 LTS platform.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C02&lt;br&gt;
Added ProxyDispatcherOnly option to the O3C/AVHS client that can control proxy&lt;br&gt;
configurations of dispatcher services.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C03&lt;br&gt;
Corrected an issue that on some occasions could cause an H.264 stream to stall after a&lt;br&gt;
while if viewed in the browser.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C04&lt;br&gt;
Corrected ONVIF response for WSPullPointSupport.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C05&lt;br&gt;
Upgraded to OpenSSL 1.1.1l.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C06&lt;br&gt;
Upgraded Apache to version 2.4.51.&lt;br&gt;
&lt;br&gt;
8.45.3.3:C07&lt;br&gt;
Corrected CVE-2021-31986.&lt;br&gt;
&lt;br&gt;
8.45.3.3:C08&lt;br&gt;
Corrected CVE-2021-31987.&lt;br&gt;
&lt;br&gt;
8.45.3.3:C09&lt;br&gt;
Corrected CVE-2021-31988.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.3.2&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
8.45.3.2:C1 Improved stability when using longer SDI cables.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 8.45.3.1&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
8.45.3.1:F1&lt;br&gt;
Updated curl to version 7.68.0 to increase the minimum cybersecurity level&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 8.45.3&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
8.45.3:F1&lt;br&gt;
Axis Zipstream now supported for reduced bandwidth and storage requirements.&lt;br&gt;
&lt;br&gt;
8.45.3:F2&lt;br&gt;
Added support for ONVIF Audio Backchannel.&lt;br&gt;
&lt;br&gt;
8.45.3:F3&lt;br&gt;
New web-interface with improved usability and broader support of web-clients and&lt;br&gt;
operating systems. For more information please see&lt;br&gt;
https://www.axis.com/global/en/support/technical-notes/browser-support.&lt;br&gt;
&lt;br&gt;
8.45.3:F4&lt;br&gt;
CamStreamer ACAP updated to 3.4.2.&lt;br&gt;
&lt;br&gt;
8.45.3:F5&lt;br&gt;
Added support for AES-CBC 256-bit SD card encryption.&lt;br&gt;
&lt;br&gt;
8.45.3:F6&lt;br&gt;
Axis Video Motion Detection updated to 4.2.5.&lt;br&gt;
&lt;br&gt;
8.45.3:F7&lt;br&gt;
Added a new section &#x22;Snapshot of current CPU utilization&#x22; that prints&lt;br&gt;
information about CPU utilization and memory consumption of processes in the&lt;br&gt;
server report.&lt;br&gt;
&lt;br&gt;
8.45.3:F8&lt;br&gt;
Changed the default timeout of HTTP-Recipient based action rules from 10s to&lt;br&gt;
120s to compensate for unstable networks or slow clients. After the timeout is&lt;br&gt;
reached, the action rule will be re-tried.&lt;br&gt;
&lt;br&gt;
8.45.3:F9&lt;br&gt;
Added the possibility for the user to share anonymous usage data with AXIS&lt;br&gt;
developers.&lt;br&gt;
&lt;br&gt;
8.45.3:F10&lt;br&gt;
Added support for automatically negotiating the preferred SMB protocol version&lt;br&gt;
with SMB 2.1 or higher in order to increase the overall minimum cybersecurity&lt;br&gt;
level. Please refer to the follwing FAQ for more information -&#x3E;&lt;br&gt;
https://www.axis.com/support/faq/FAQ116392.&lt;br&gt;
&lt;br&gt;
8.45.3:F11&lt;br&gt;
Added support for ONVIF Audio Backchannel with support for G711 and G726 audio&lt;br&gt;
codec. Cameras are able to retrieve audio while sending an audio capable video&lt;br&gt;
stream with metadata in the same RTSP session.&lt;br&gt;
&lt;br&gt;
8.45.3:F12&lt;br&gt;
Updated OpenEmbedded to version Poky Rocko to increase overall cyber security&lt;br&gt;
level.&lt;br&gt;
&lt;br&gt;
8.45.3:F13&lt;br&gt;
Updated the maximum number of recipients for action rules to 20 from 10.&lt;br&gt;
&lt;br&gt;
8.45.3:F14&lt;br&gt;
Changed the default setting of SRTP to disabled in order to reduce the number of&lt;br&gt;
ports opened by default.&lt;br&gt;
&lt;br&gt;
8.45.3:F15&lt;br&gt;
Prepared support for signed firmware to increase overall cyber security level.&lt;br&gt;
It is planned that the product will only accept AXIS security-signed firmware&lt;br&gt;
starting in Q1/Q2 2019 and onwards.&lt;br&gt;
&lt;br&gt;
8.45.3:F16&lt;br&gt;
The possibility to edit scripts in camera has been disabled per default in order&lt;br&gt;
to increase minimum cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:F17&lt;br&gt;
Updated NTP server (openntpd) to version 6.2p3.&lt;br&gt;
&lt;br&gt;
8.45.3:F18&lt;br&gt;
Added support for showing hidden resolutions via API. The parameter&lt;br&gt;
Properties.Image.ShowSuboptimalResolutions has been added which will, when&lt;br&gt;
enabled, show all of the products supported resolutions.&lt;br&gt;
&lt;br&gt;
8.45.3:F19&lt;br&gt;
Changed the behavior of the capture mode parameter. Changing capture mode&lt;br&gt;
requires a reboot now.&lt;br&gt;
&lt;br&gt;
8.45.3:F20&lt;br&gt;
Support for Firmware Recovery under Settings -&#x3E; System -&#x3E; Maintenance. The&lt;br&gt;
product is saving a restore point every time the firmware is updated, allowing&lt;br&gt;
the user to rollback to a previous firmware and its configuration.&lt;br&gt;
&lt;br&gt;
8.45.3:F21&lt;br&gt;
Support for HTTP keep-alive connections via ONVIF. PTZ products can now be&lt;br&gt;
controlled via HTTP keep-alive connections. This increases PTZ control accuracy,&lt;br&gt;
reduces overhead communication and therefore lowers the risk for security&lt;br&gt;
focused network infrastructure or unstable networks to block or drop PTZ control&lt;br&gt;
commands.&lt;br&gt;
&lt;br&gt;
8.45.3:F22&lt;br&gt;
Support for browser stream statistics in Live View.&lt;br&gt;
&lt;br&gt;
8.45.3:F23&lt;br&gt;
Support for Password Security Confirmation Check. To increase overall&lt;br&gt;
cybersecurity awareness, a user-configured password that is considered &#x22;weak&#x22;&lt;br&gt;
need to be confirmed actively twice by the user.&lt;br&gt;
&lt;br&gt;
8.45.3:F24&lt;br&gt;
The functionality of enabling Axis DNS Service via control button has been&lt;br&gt;
disabled by default. It can be enabled again using VAPIX.&lt;br&gt;
&lt;br&gt;
8.45.3:F25&lt;br&gt;
Changed the default web server authentication from Basic &#x26; Digest to Digest&lt;br&gt;
only.&lt;br&gt;
&lt;br&gt;
8.45.3:F26&lt;br&gt;
Upon a factory default, the camera will generate a self-signed certificate at&lt;br&gt;
boot and enable HTTPS. This allows clients to use encrypted access from start.&lt;br&gt;
If HTTPS is to be used in daily operations, it is recommended to replace the&lt;br&gt;
generated self-signed certificate with a CA-signed certificate.&lt;br&gt;
&lt;br&gt;
8.45.3:F27&lt;br&gt;
PTZ products can be controlled now via HTTP 1.1 keep-alive connections which&lt;br&gt;
increases PTZ control accuracy, reduces overhead communication and therefore&lt;br&gt;
lowers the risk for security focused network infrastructure to block PTZ control&lt;br&gt;
commands when controlling a PTZ camera.&lt;br&gt;
&lt;br&gt;
8.45.3:F28&lt;br&gt;
Support for AXIS SD card health API. The SD card health API allows a client to&lt;br&gt;
track and request the health and wear-out state of an camera with AXIS&lt;br&gt;
Surveillance SD Card.&lt;br&gt;
&lt;br&gt;
8.45.3:F29&lt;br&gt;
The Axis Media Control (AMC) is not longer embedded in the product and needs to&lt;br&gt;
be downloaded separately on https://www.axis.com/global/en/support/downloads&lt;br&gt;
/axis-media-control if needed. The Java Applet has been removed as well.&lt;br&gt;
&lt;br&gt;
8.45.3:F30&lt;br&gt;
Our ONVIF implementation have been improved by adding&lt;br&gt;
GetVideoEncoderConfigurationOptions extension. This makes it possible for an&lt;br&gt;
ONVIF client to get the bitrate range.&lt;br&gt;
&lt;br&gt;
8.45.3:F31&lt;br&gt;
Renamed &#x22;Browser Stream Statistics&#x22; to &#x22;Client Stream Information&#x22;. The Client&lt;br&gt;
Stream Information are available in the web-interface of the camera.&lt;br&gt;
&lt;br&gt;
8.45.3:F32&lt;br&gt;
The new web-interface supports 12 different pre-installed languages which will&lt;br&gt;
be chosen automatically based on browser settings. Uploading individual language&lt;br&gt;
files is not needed anymore.&lt;br&gt;
&lt;br&gt;
8.45.3:F33&lt;br&gt;
Updated help files with more detailed information about SMB and Certificate&lt;br&gt;
support in AXIS products.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.3.1&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
8.45.3.1:C1&lt;br&gt;
Corrected an issue that had removed the option to select line level audio input for 3.5mm from audio tab.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C2&lt;br&gt;
Corrected an issue that had removed the option to add or remove 30dB audio boost.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C3&lt;br&gt;
Corrected an issue that caused custom FTP ports to no longer function.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C4&lt;br&gt;
Corrected an issue where the right audio channel failed to mute.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C5&lt;br&gt;
Updated wpa-supplicant to version 2.9 and hostapd to version 2.9 to increase overall minimum cyber security level.&lt;br&gt;
Corrections for the following security vulnerabilities are included:&lt;br&gt;
CVE-2019-13377&lt;br&gt;
CVE-2019-162&lt;br&gt;
&lt;br&gt;
8.45.3.1:C6&lt;br&gt;
Corrected an issue that prevented the device from resolving DNS hostnames when used in combination with SNMP.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C7&lt;br&gt;
Corrected Vendor class identifier for DHCP negotiation.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C8&lt;br&gt;
Corrected an issue that caused the test recipient button in the Web GUI to not work properly when setting up an event mail recipient.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C9&lt;br&gt;
Corrected an issue that caused multicast redirection to fail on rare occasions.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.3&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
8.45.3:C1&lt;br&gt;
Updated OpenSSL to version 1.1.1d to increase overall minimum cyber security&lt;br&gt;
level.&lt;br&gt;
&lt;br&gt;
8.45.3:C2&lt;br&gt;
Updated Apache to version 2.4.41 to increase overall minimum cyber security&lt;br&gt;
level.&lt;br&gt;
&lt;br&gt;
8.45.3:C3&lt;br&gt;
Update libssh2 to version 1.9.0 to increase overall minimum cyber security&lt;br&gt;
level. This update includes correction for CVE-2019-13115.&lt;br&gt;
&lt;br&gt;
8.45.3:C4&lt;br&gt;
Corrected the following kernel vulnerabilities to increase overall minimum cyber&lt;br&gt;
security level (collectively known as &#x22;TCP SACK PANIC&#x22;):&lt;br&gt;
CVE-2019-11477,CVE-2019-11478,CVE-2019-11479.&lt;br&gt;
&lt;br&gt;
8.45.3:C5&lt;br&gt;
Improved the certificate management system: It is now possible to upload PKCS#12&lt;br&gt;
certificates with a total size of 102400 bytes. The previous limit was 1/10 of it.&lt;br&gt;
&lt;br&gt;
8.45.3:C6&lt;br&gt;
Improved the certificate management system: added support for certificate IDs&lt;br&gt;
with long names.&lt;br&gt;
&lt;br&gt;
8.45.3:C7&lt;br&gt;
Added support for TLSv1.3.&lt;br&gt;
&lt;br&gt;
8.45.3:C8&lt;br&gt;
Corrected security vulnerability in Systemd CVE-2019-6454 to increase overall&lt;br&gt;
minimum cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:C9&lt;br&gt;
Improved the certificate management system: added system log information for failing&lt;br&gt;
certificate upload.&lt;br&gt;
&lt;br&gt;
8.45.3:C10&lt;br&gt;
Improved robustness of the O3C client.&lt;br&gt;
&lt;br&gt;
8.45.3:C11&lt;br&gt;
Updated OpenSSH to version 7.9p to increase overall minimum cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:C12&lt;br&gt;
Added information about Certificate ID to the Installed Certificates section in&lt;br&gt;
the server report.&lt;br&gt;
&lt;br&gt;
8.45.3:C13&lt;br&gt;
Corrected the following security vulnerabilities to increase overall minimum&lt;br&gt;
cyber security level: CVE-2019-3855, CVE-2019-3856, CVE-2019-3857, CVE-2019-3858,&lt;br&gt;
CVE-2019-3859, CVE-2019-3860, CVE-2019-3861, CVE-2019-3862, CVE-2019-3863, CVE-2018-10876,&lt;br&gt;
CVE-2018-10877, CVE-2018-10878, CVE-2018-10879, CVE-2018-10880, CVE-2018-10881, CVE-2018-10882,&lt;br&gt;
CVE-2018-10883, CVE-2018-17182, CVE-2018-5390, CVE-2018-14526, CVE-2016-2147, CVE-2016-2148,&lt;br&gt;
CVE-2017-9798, CVE-2018-16864, CVE-2017-16544, CVE-2019-6454, CVE-2018-16865, CVE-2018-16866,&lt;br&gt;
CVE-2019-0217.&lt;br&gt;
&lt;br&gt;
8.45.3:C14&lt;br&gt;
Updated pre-installed Mozilla CA-certificates to versions available at 20190122.&lt;br&gt;
&lt;br&gt;
8.45.3:C15&lt;br&gt;
Added GOP Length option to the Stream Profile Settings.&lt;br&gt;
&lt;br&gt;
8.45.3:C16&lt;br&gt;
Improved list.cgi to display all installed applications (no longer limited to&lt;br&gt;
8).&lt;br&gt;
&lt;br&gt;
8.45.3:C17&lt;br&gt;
Improved stability in the httptest.cgi.&lt;br&gt;
&lt;br&gt;
8.45.3:C18&lt;br&gt;
Added Firmware Recovery (Firmware Rollback) information to the server report.&lt;br&gt;
&lt;br&gt;
8.45.3:C19&lt;br&gt;
Added selection boxes for disabling TLSv1.0 and TLSv1.1 in Settings -&#x3E; System -&#x3E;&lt;br&gt;
PlainConfig -&#x3E; HTTPS to enforce the highest possible TLS version for HTTPS-based&lt;br&gt;
connections.&lt;br&gt;
&lt;br&gt;
8.45.3:C20&lt;br&gt;
Improved HTTP image upload stability in unstable networks.&lt;br&gt;
&lt;br&gt;
8.45.3:C21&lt;br&gt;
Improved camera stability when metadata is used.&lt;br&gt;
&lt;br&gt;
8.45.3:C22&lt;br&gt;
Improved loading of the web-interface in unstable networks.&lt;br&gt;
&lt;br&gt;
8.45.3:C23&lt;br&gt;
Improved stability in actionengine (tcp notification).&lt;br&gt;
&lt;br&gt;
8.45.3:C24&lt;br&gt;
Increased the limit of concurrent HTTP requests for I/O related VAPIX commands&lt;br&gt;
from 4 to&lt;br&gt;
10.&lt;br&gt;
&lt;br&gt;
8.45.3:C25&lt;br&gt;
Adjusted re-connection behavior of interrupted AVHS connections on AVHS-server&lt;br&gt;
side. The time between failed connection attempts will now gradually increase until a hard&lt;br&gt;
limit is reached.&lt;br&gt;
&lt;br&gt;
8.45.3:C26&lt;br&gt;
Added Perfect Forward Secrecy ciphers (DHE-RSA) to the ciphers selection.&lt;br&gt;
&lt;br&gt;
8.45.3:C27&lt;br&gt;
Added selection boxes for disabling TLSv1.0 and TLSv1.1 in Settings -&#x3E; System -&#x3E;&lt;br&gt;
PlainConfig -&#x3E; HTTPS to enforce the highest possible HTTPS negotiation client&lt;br&gt;
handshake via TLSv1.2.&lt;br&gt;
&lt;br&gt;
8.45.3:C28&lt;br&gt;
Added a Storage Stability Helper service for better handling of Network Shares.&lt;br&gt;
&lt;br&gt;
8.45.3:C29&lt;br&gt;
Adds PID/program name to network connection list in the Server Report.&lt;br&gt;
&lt;br&gt;
8.45.3:C30&lt;br&gt;
Updated R2 GlobalSign Root Certificate to version 20170717. Required to enable&lt;br&gt;
Email&lt;br&gt;
recipients using &#x27;Validate server certificate&#x27;.&lt;br&gt;
&lt;br&gt;
8.45.3:C31&lt;br&gt;
Added support for certificates with expiration dates beyond year 2038.&lt;br&gt;
&lt;br&gt;
8.45.3:C32&lt;br&gt;
Support for HTTP keep-alive connections via ONVIF. lowers the risk for security&lt;br&gt;
focused network infrastructure or unstable networks to block or drop PTZ control&lt;br&gt;
commands.&lt;br&gt;
&lt;br&gt;
8.45.3:C33&lt;br&gt;
Corrected an issue that let the PTZ control queue ignore an anonymous viewer account and deny PTZ control.&lt;br&gt;
&lt;br&gt;
8.45.3:C34&lt;br&gt;
Improved user notification when creating a E-mail recipient that contains wrong domain&lt;br&gt;
information.&lt;br&gt;
&lt;br&gt;
8.45.3:C35&lt;br&gt;
Improved camera stability when metadata is used.&lt;br&gt;
&lt;br&gt;
8.45.3:C36&lt;br&gt;
Improved camera stability when using liblicensekey.&lt;br&gt;
&lt;br&gt;
8.45.3:C37&lt;br&gt;
The correct IPv6 router IP-addresses are now shown correctly in the network interface of the web-interface and in ONVIF responses.&lt;br&gt;
&lt;br&gt;
8.45.3:C38&lt;br&gt;
Adjusted the system log messages for the NTP daemon to be more specific and highlight that there is a time drift instead of an &#x22;adjustment&#x22;.&lt;br&gt;
&lt;br&gt;
8.45.3:C39&lt;br&gt;
Upgrade SSL negotiation in the AVHS client to SSLv23 instead of the deprecated TLSv1.&lt;br&gt;
&lt;br&gt;
8.45.3:C40&lt;br&gt;
The triple DES cipher is not selected as DEFAULT in the HTTPS settings to increase overall cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:C41&lt;br&gt;
Updated the Portable UPnP SDK to 1.6.22 to increase the overall cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:C42&lt;br&gt;
Improved stability for TCP notifications.&lt;br&gt;
&lt;br&gt;
8.45.3:C43&lt;br&gt;
Improved camera stability when TriggerData is used.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">V5914 8.45.4.5</guid>
      <pubDate>Fri, 04 Jul 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS V5915, version 8.45.4.5</title>
      <link>https://www.axis.com/support/firmware#c5e0820471d3bce571e68b1ea8c6f7ec</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
BEFORE upgrading from 5.75.1.13 please note the following IMPORTANT INFORMATION:&lt;br&gt;
As this is a very large step in Firmware versions, a Factory Default or&lt;br&gt;
Factory Restore of the camera is required after the update in order to ensure &lt;br&gt;
full functionality.&lt;br&gt;
This can be done via the web interface. Go to Settings &#x3E; Sytem &#x3E; Maintenance.&lt;br&gt;
More information on performing a Factory Reset can be found in the User Manual.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Updates 8.45.4.5 since 8.45.4.4&lt;br&gt;
================================================&lt;br&gt;
Features: &lt;br&gt;
&lt;br&gt;
8.45.4.5:F01&lt;br&gt;
Updated the End User License Agreement.&lt;br&gt;
&lt;br&gt;
Cybersecurity:  &lt;br&gt;
&lt;br&gt;
8.45.4.5:S01&lt;br&gt;
Updated OpenSSH to version 9.9p2, addressing CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
8.45.4.5:S02&lt;br&gt;
Updated OpenSSL to version 1.1.1zb to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.5:S03&lt;br&gt;
Updated cURL to version 8.12.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S04&lt;br&gt;
Addressed CVE-2025-0325. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.5:S05&lt;br&gt;
Addressed CVE-2024-47262. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.5:S06&lt;br&gt;
Updated wpa-supplicant to version 2.11 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
Corrections:&lt;br&gt;
8.45.4.5:C01&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
8.45.4.5:C02&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
8.45.4.5:C03&lt;br&gt;
Improved stability and reliability of the certificate management service.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Updates 8.45.4.4 since 8.45.4.3&lt;br&gt;
================================================&lt;br&gt;
Cybersecurity:  &lt;br&gt;
&lt;br&gt;
8.45.4.4:S01&lt;br&gt;
Updated Apache to version 2.4.62 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S02&lt;br&gt;
Updated OpenSSL to version 1.1.1y to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S03&lt;br&gt;
Updated OpenSSH to version 9.8p1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S04&lt;br&gt;
Updated cURL to version 8.9.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S05&lt;br&gt;
Updated libssh2 to version 1.11.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S06&lt;br&gt;
Updated Nettle cryptographic library to version 3.6 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S07&lt;br&gt;
Addressed vulnerability allowing unauthorized command execution via param.cgi.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S08&lt;br&gt;
Addressed a vulnerability allowing DHCPv6 lease injection through unvalidated input parameters.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S09&lt;br&gt;
Addressed vulnerabilities in GnuTLS: CVE-2024-28834 and CVE-2024-28835.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S10&lt;br&gt;
Addressed CVE-2023-52160 in wpa-supplicant to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S11&lt;br&gt;
Addressed CVE-2024-0067, CVE-2024-6173, CVE-2024-6509. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S12&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S13&lt;br&gt;
The parameter RemoteService.ProxyPassword that controls the proxy password has been masked and made unreadable for security reasons.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S14&lt;br&gt;
Addressed CVE-2024-0054. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
8.45.4.4:S15&lt;br&gt;
Addressed CVE-2023-5800. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
Corrections:&lt;br&gt;
&lt;br&gt;
8.45.4.4:C01&lt;br&gt;
Resolved an issue where SSH users could retain access after a factory default with kept IP settings.&lt;br&gt;
&lt;br&gt;
8.45.4.4:C02&lt;br&gt;
Corrected a stream crash caused by invalid float values in CGI input.&lt;br&gt;
&lt;br&gt;
8.45.4.4:C03&lt;br&gt;
Implemented DNS cache for O3C client to reduce DNS lookups.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Updates 8.45.4.3 since 8.45.4.2&lt;br&gt;
================================================&lt;br&gt;
Features: &lt;br&gt;
&lt;br&gt;
8.45.4.3:F01&lt;br&gt;
Improved UPnP compliance by updating the SSDP (Simple Service Discovery Protocol) SERVER header in the standard &#x22;OS/version UPnP/1.0 product/version&#x22; format and USN (Unique Service Name) field with a UUID in the standard format. This enhances consistency and compatibility.&lt;br&gt;
&lt;br&gt;
8.45.4.3:F02&lt;br&gt;
Improved the manager client certificates and added support for installing multiple trust certificates and requesting/installing a second client certificate.&lt;br&gt;
&lt;br&gt;
Cybersecurity:  &lt;br&gt;
&lt;br&gt;
8.45.4.3:S01&lt;br&gt;
Updated CURL to version 8.4.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S02&lt;br&gt;
Updated OpenSSL to version 1.1.1w to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S03&lt;br&gt;
Updated Apache to version 2.4.57 to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S04&lt;br&gt;
Receiving ICMP secure redirects from other network hosts are now disabled to increase overall minimum cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S05&lt;br&gt;
Addressed CVE-2023-21418. For more information, please visit https://www.axis.com/support/cybersecurity/vulnerability-management.&lt;br&gt;
&lt;br&gt;
8.45.4.3:S06&lt;br&gt;
Addressed CVE-2023-21415. For more information, please visit https://www.axis.com/support/cybersecurity/vulnerability-management.&lt;br&gt;
&lt;br&gt;
Corrections:&lt;br&gt;
&lt;br&gt;
8.45.4.3:C01&lt;br&gt;
Netd Service preserves the static resolver configuration even after a soft restore, safeguarding static DNS/Search domain settings.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C02&lt;br&gt;
Corrected an issue with OAK (owner authentication key). It now only produces warnings in the log instead of errors if the device is not able to connect to the internet.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C04&lt;br&gt;
Improved stability of syslog system by addressing a potential memory leak.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C05&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis- cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C06&lt;br&gt;
Updated libupnp to version 1.14.16, solving a memory leak and improving overall stability.&lt;br&gt;
&lt;br&gt;
8.45.4.3:C07&lt;br&gt;
Corrected an issue with certificate parsing during certificate uploads.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.4.2 since 8.45.4.1&lt;br&gt;
=======================================&lt;br&gt;
8.45.4.2:C01&lt;br&gt;
Updated cURL to version 7.86.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.4.1 since 8.45.4&lt;br&gt;
=======================================&lt;br&gt;
8.45.4.1:C01&lt;br&gt;
Updated OpenSSL to version 1.1.1q to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4.1:C02&lt;br&gt;
Updated curl to version 7.84.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.4 since 8.45.3.3&lt;br&gt;
=======================================&lt;br&gt;
8.45.4:C01&lt;br&gt;
Updated OpenSSL to version 1.1.1o to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
8.45.4:C02&lt;br&gt;
Updated Apache web server to version 2.4.54 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.3.3 since 8.45.3.2&lt;br&gt;
=======================================&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C01&lt;br&gt;
General improvements to the 2018 LTS platform.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C02&lt;br&gt;
Added ProxyDispatcherOnly option to the O3C/AVHS client that can control proxy&lt;br&gt;
configurations of dispatcher services.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C03&lt;br&gt;
Corrected an issue that on some occasions could cause an H.264 stream to stall after a&lt;br&gt;
while if viewed in the browser.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C04&lt;br&gt;
Corrected ONVIF response for WSPullPointSupport.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C05&lt;br&gt;
Upgraded to OpenSSL 1.1.1l.&lt;br&gt;
 &lt;br&gt;
8.45.3.3:C06&lt;br&gt;
Upgraded Apache to version 2.4.51.&lt;br&gt;
&lt;br&gt;
8.45.3.3:C07&lt;br&gt;
Corrected CVE-2021-31986.&lt;br&gt;
&lt;br&gt;
8.45.3.3:C08&lt;br&gt;
Corrected CVE-2021-31987.&lt;br&gt;
&lt;br&gt;
8.45.3.3:C09&lt;br&gt;
Corrected CVE-2021-31988.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.3.2&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
8.45.3.2:C1 Improved stability when using longer SDI cables.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 8.45.3.1&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
8.45.3.1:F1&lt;br&gt;
Updated curl to version 7.68.0 to increase the minimum cybersecurity level&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 8.45.3&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
8.45.3:F1&lt;br&gt;
Axis Zipstream now supported for reduced bandwidth and storage requirements.&lt;br&gt;
&lt;br&gt;
8.45.3:F2&lt;br&gt;
Added support for ONVIF Audio Backchannel.&lt;br&gt;
&lt;br&gt;
8.45.3:F3&lt;br&gt;
New web-interface with improved usability and broader support of web-clients and&lt;br&gt;
operating systems. For more information please see&lt;br&gt;
https://www.axis.com/global/en/support/technical-notes/browser-support.&lt;br&gt;
&lt;br&gt;
8.45.3:F4&lt;br&gt;
CamStreamer ACAP updated to 3.4.2.&lt;br&gt;
&lt;br&gt;
8.45.3:F5&lt;br&gt;
Added support for AES-CBC 256-bit SD card encryption.&lt;br&gt;
&lt;br&gt;
8.45.3:F6&lt;br&gt;
Axis Video Motion Detection updated to 4.2.5.&lt;br&gt;
&lt;br&gt;
8.45.3:F7&lt;br&gt;
Added a new section &#x22;Snapshot of current CPU utilization&#x22; that prints&lt;br&gt;
information about CPU utilization and memory consumption of processes in the&lt;br&gt;
server report.&lt;br&gt;
&lt;br&gt;
8.45.3:F8&lt;br&gt;
Changed the default timeout of HTTP-Recipient based action rules from 10s to&lt;br&gt;
120s to compensate for unstable networks or slow clients. After the timeout is&lt;br&gt;
reached, the action rule will be re-tried.&lt;br&gt;
&lt;br&gt;
8.45.3:F9&lt;br&gt;
Added the possibility for the user to share anonymous usage data with AXIS&lt;br&gt;
developers.&lt;br&gt;
&lt;br&gt;
8.45.3:F10&lt;br&gt;
Added support for automatically negotiating the preferred SMB protocol version&lt;br&gt;
with SMB 2.1 or higher in order to increase the overall minimum cybersecurity&lt;br&gt;
level. Please refer to the follwing FAQ for more information -&#x3E;&lt;br&gt;
https://www.axis.com/support/faq/FAQ116392.&lt;br&gt;
&lt;br&gt;
8.45.3:F11&lt;br&gt;
Added support for ONVIF Audio Backchannel with support for G711 and G726 audio&lt;br&gt;
codec. Cameras are able to retrieve audio while sending an audio capable video&lt;br&gt;
stream with metadata in the same RTSP session.&lt;br&gt;
&lt;br&gt;
8.45.3:F12&lt;br&gt;
Updated OpenEmbedded to version Poky Rocko to increase overall cyber security&lt;br&gt;
level.&lt;br&gt;
&lt;br&gt;
8.45.3:F13&lt;br&gt;
Updated the maximum number of recipients for action rules to 20 from 10.&lt;br&gt;
&lt;br&gt;
8.45.3:F14&lt;br&gt;
Changed the default setting of SRTP to disabled in order to reduce the number of&lt;br&gt;
ports opened by default.&lt;br&gt;
&lt;br&gt;
8.45.3:F15&lt;br&gt;
Prepared support for signed firmware to increase overall cyber security level.&lt;br&gt;
It is planned that the product will only accept AXIS security-signed firmware&lt;br&gt;
starting in Q1/Q2 2019 and onwards.&lt;br&gt;
&lt;br&gt;
8.45.3:F16&lt;br&gt;
The possibility to edit scripts in camera has been disabled per default in order&lt;br&gt;
to increase minimum cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:F17&lt;br&gt;
Updated NTP server (openntpd) to version 6.2p3.&lt;br&gt;
&lt;br&gt;
8.45.3:F18&lt;br&gt;
Added support for showing hidden resolutions via API. The parameter&lt;br&gt;
Properties.Image.ShowSuboptimalResolutions has been added which will, when&lt;br&gt;
enabled, show all of the products supported resolutions.&lt;br&gt;
&lt;br&gt;
8.45.3:F19&lt;br&gt;
Changed the behavior of the capture mode parameter. Changing capture mode&lt;br&gt;
requires a reboot now.&lt;br&gt;
&lt;br&gt;
8.45.3:F20&lt;br&gt;
Support for Firmware Recovery under Settings -&#x3E; System -&#x3E; Maintenance. The&lt;br&gt;
product is saving a restore point every time the firmware is updated, allowing&lt;br&gt;
the user to rollback to a previous firmware and its configuration.&lt;br&gt;
&lt;br&gt;
8.45.3:F21&lt;br&gt;
Support for HTTP keep-alive connections via ONVIF. PTZ products can now be&lt;br&gt;
controlled via HTTP keep-alive connections. This increases PTZ control accuracy,&lt;br&gt;
reduces overhead communication and therefore lowers the risk for security&lt;br&gt;
focused network infrastructure or unstable networks to block or drop PTZ control&lt;br&gt;
commands.&lt;br&gt;
&lt;br&gt;
8.45.3:F22&lt;br&gt;
Support for browser stream statistics in Live View.&lt;br&gt;
&lt;br&gt;
8.45.3:F23&lt;br&gt;
Support for Password Security Confirmation Check. To increase overall&lt;br&gt;
cybersecurity awareness, a user-configured password that is considered &#x22;weak&#x22;&lt;br&gt;
need to be confirmed actively twice by the user.&lt;br&gt;
&lt;br&gt;
8.45.3:F24&lt;br&gt;
The functionality of enabling Axis DNS Service via control button has been&lt;br&gt;
disabled by default. It can be enabled again using VAPIX.&lt;br&gt;
&lt;br&gt;
8.45.3:F25&lt;br&gt;
Changed the default web server authentication from Basic &#x26; Digest to Digest&lt;br&gt;
only.&lt;br&gt;
&lt;br&gt;
8.45.3:F26&lt;br&gt;
Upon a factory default, the camera will generate a self-signed certificate at&lt;br&gt;
boot and enable HTTPS. This allows clients to use encrypted access from start.&lt;br&gt;
If HTTPS is to be used in daily operations, it is recommended to replace the&lt;br&gt;
generated self-signed certificate with a CA-signed certificate.&lt;br&gt;
&lt;br&gt;
8.45.3:F27&lt;br&gt;
PTZ products can be controlled now via HTTP 1.1 keep-alive connections which&lt;br&gt;
increases PTZ control accuracy, reduces overhead communication and therefore&lt;br&gt;
lowers the risk for security focused network infrastructure to block PTZ control&lt;br&gt;
commands when controlling a PTZ camera.&lt;br&gt;
&lt;br&gt;
8.45.3:F28&lt;br&gt;
Support for AXIS SD card health API. The SD card health API allows a client to&lt;br&gt;
track and request the health and wear-out state of an camera with AXIS&lt;br&gt;
Surveillance SD Card.&lt;br&gt;
&lt;br&gt;
8.45.3:F29&lt;br&gt;
The Axis Media Control (AMC) is not longer embedded in the product and needs to&lt;br&gt;
be downloaded separately on https://www.axis.com/global/en/support/downloads&lt;br&gt;
/axis-media-control if needed. The Java Applet has been removed as well.&lt;br&gt;
&lt;br&gt;
8.45.3:F30&lt;br&gt;
Our ONVIF implementation have been improved by adding&lt;br&gt;
GetVideoEncoderConfigurationOptions extension. This makes it possible for an&lt;br&gt;
ONVIF client to get the bitrate range.&lt;br&gt;
&lt;br&gt;
8.45.3:F31&lt;br&gt;
Renamed &#x22;Browser Stream Statistics&#x22; to &#x22;Client Stream Information&#x22;. The Client&lt;br&gt;
Stream Information are available in the web-interface of the camera.&lt;br&gt;
&lt;br&gt;
8.45.3:F32&lt;br&gt;
The new web-interface supports 12 different pre-installed languages which will&lt;br&gt;
be chosen automatically based on browser settings. Uploading individual language&lt;br&gt;
files is not needed anymore.&lt;br&gt;
&lt;br&gt;
8.45.3:F33&lt;br&gt;
Updated help files with more detailed information about SMB and Certificate&lt;br&gt;
support in AXIS products.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.3.1&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
8.45.3.1:C1&lt;br&gt;
Corrected an issue that had removed the option to select line level audio input for 3.5mm from audio tab.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C2&lt;br&gt;
Corrected an issue that had removed the option to add or remove 30dB audio boost.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C3&lt;br&gt;
Corrected an issue that caused custom FTP ports to no longer function.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C4&lt;br&gt;
Corrected an issue where the right audio channel failed to mute.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C5&lt;br&gt;
Updated wpa-supplicant to version 2.9 and hostapd to version 2.9 to increase overall minimum cyber security level.&lt;br&gt;
Corrections for the following security vulnerabilities are included:&lt;br&gt;
CVE-2019-13377&lt;br&gt;
CVE-2019-162&lt;br&gt;
&lt;br&gt;
8.45.3.1:C6&lt;br&gt;
Corrected an issue that prevented the device from resolving DNS hostnames when used in combination with SNMP.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C7&lt;br&gt;
Corrected Vendor class identifier for DHCP negotiation.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C8&lt;br&gt;
Corrected an issue that caused the test recipient button in the Web GUI to not work properly when setting up an event mail recipient.&lt;br&gt;
&lt;br&gt;
8.45.3.1:C9&lt;br&gt;
Corrected an issue that caused multicast redirection to fail on rare occasions.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 8.45.3&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
8.45.3:C1&lt;br&gt;
Updated OpenSSL to version 1.1.1d to increase overall minimum cyber security&lt;br&gt;
level.&lt;br&gt;
&lt;br&gt;
8.45.3:C2&lt;br&gt;
Updated Apache to version 2.4.41 to increase overall minimum cyber security&lt;br&gt;
level.&lt;br&gt;
&lt;br&gt;
8.45.3:C3&lt;br&gt;
Update libssh2 to version 1.9.0 to increase overall minimum cyber security&lt;br&gt;
level. This update includes correction for CVE-2019-13115.&lt;br&gt;
&lt;br&gt;
8.45.3:C4&lt;br&gt;
Corrected the following kernel vulnerabilities to increase overall minimum cyber&lt;br&gt;
security level (collectively known as &#x22;TCP SACK PANIC&#x22;):&lt;br&gt;
CVE-2019-11477,CVE-2019-11478,CVE-2019-11479.&lt;br&gt;
&lt;br&gt;
8.45.3:C5&lt;br&gt;
Improved the certificate management system: It is now possible to upload PKCS#12&lt;br&gt;
certificates with a total size of 102400 bytes. The previous limit was 1/10 of it.&lt;br&gt;
&lt;br&gt;
8.45.3:C6&lt;br&gt;
Improved the certificate management system: added support for certificate IDs&lt;br&gt;
with long names.&lt;br&gt;
&lt;br&gt;
8.45.3:C7&lt;br&gt;
Added support for TLSv1.3.&lt;br&gt;
&lt;br&gt;
8.45.3:C8&lt;br&gt;
Corrected security vulnerability in Systemd CVE-2019-6454 to increase overall&lt;br&gt;
minimum cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:C9&lt;br&gt;
Improved the certificate management system: added system log information for failing&lt;br&gt;
certificate upload.&lt;br&gt;
&lt;br&gt;
8.45.3:C10&lt;br&gt;
Improved robustness of the O3C client.&lt;br&gt;
&lt;br&gt;
8.45.3:C11&lt;br&gt;
Updated OpenSSH to version 7.9p to increase overall minimum cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:C12&lt;br&gt;
Added information about Certificate ID to the Installed Certificates section in&lt;br&gt;
the server report.&lt;br&gt;
&lt;br&gt;
8.45.3:C13&lt;br&gt;
Corrected the following security vulnerabilities to increase overall minimum&lt;br&gt;
cyber security level: CVE-2019-3855, CVE-2019-3856, CVE-2019-3857, CVE-2019-3858,&lt;br&gt;
CVE-2019-3859, CVE-2019-3860, CVE-2019-3861, CVE-2019-3862, CVE-2019-3863, CVE-2018-10876,&lt;br&gt;
CVE-2018-10877, CVE-2018-10878, CVE-2018-10879, CVE-2018-10880, CVE-2018-10881, CVE-2018-10882,&lt;br&gt;
CVE-2018-10883, CVE-2018-17182, CVE-2018-5390, CVE-2018-14526, CVE-2016-2147, CVE-2016-2148,&lt;br&gt;
CVE-2017-9798, CVE-2018-16864, CVE-2017-16544, CVE-2019-6454, CVE-2018-16865, CVE-2018-16866,&lt;br&gt;
CVE-2019-0217.&lt;br&gt;
&lt;br&gt;
8.45.3:C14&lt;br&gt;
Updated pre-installed Mozilla CA-certificates to versions available at 20190122.&lt;br&gt;
&lt;br&gt;
8.45.3:C15&lt;br&gt;
Added GOP Length option to the Stream Profile Settings.&lt;br&gt;
&lt;br&gt;
8.45.3:C16&lt;br&gt;
Improved list.cgi to display all installed applications (no longer limited to&lt;br&gt;
8).&lt;br&gt;
&lt;br&gt;
8.45.3:C17&lt;br&gt;
Improved stability in the httptest.cgi.&lt;br&gt;
&lt;br&gt;
8.45.3:C18&lt;br&gt;
Added Firmware Recovery (Firmware Rollback) information to the server report.&lt;br&gt;
&lt;br&gt;
8.45.3:C19&lt;br&gt;
Added selection boxes for disabling TLSv1.0 and TLSv1.1 in Settings -&#x3E; System -&#x3E;&lt;br&gt;
PlainConfig -&#x3E; HTTPS to enforce the highest possible TLS version for HTTPS-based&lt;br&gt;
connections.&lt;br&gt;
&lt;br&gt;
8.45.3:C20&lt;br&gt;
Improved HTTP image upload stability in unstable networks.&lt;br&gt;
&lt;br&gt;
8.45.3:C21&lt;br&gt;
Improved camera stability when metadata is used.&lt;br&gt;
&lt;br&gt;
8.45.3:C22&lt;br&gt;
Improved loading of the web-interface in unstable networks.&lt;br&gt;
&lt;br&gt;
8.45.3:C23&lt;br&gt;
Improved stability in actionengine (tcp notification).&lt;br&gt;
&lt;br&gt;
8.45.3:C24&lt;br&gt;
Increased the limit of concurrent HTTP requests for I/O related VAPIX commands&lt;br&gt;
from 4 to&lt;br&gt;
10.&lt;br&gt;
&lt;br&gt;
8.45.3:C25&lt;br&gt;
Adjusted re-connection behavior of interrupted AVHS connections on AVHS-server&lt;br&gt;
side. The time between failed connection attempts will now gradually increase until a hard&lt;br&gt;
limit is reached.&lt;br&gt;
&lt;br&gt;
8.45.3:C26&lt;br&gt;
Added Perfect Forward Secrecy ciphers (DHE-RSA) to the ciphers selection.&lt;br&gt;
&lt;br&gt;
8.45.3:C27&lt;br&gt;
Added selection boxes for disabling TLSv1.0 and TLSv1.1 in Settings -&#x3E; System -&#x3E;&lt;br&gt;
PlainConfig -&#x3E; HTTPS to enforce the highest possible HTTPS negotiation client&lt;br&gt;
handshake via TLSv1.2.&lt;br&gt;
&lt;br&gt;
8.45.3:C28&lt;br&gt;
Added a Storage Stability Helper service for better handling of Network Shares.&lt;br&gt;
&lt;br&gt;
8.45.3:C29&lt;br&gt;
Adds PID/program name to network connection list in the Server Report.&lt;br&gt;
&lt;br&gt;
8.45.3:C30&lt;br&gt;
Updated R2 GlobalSign Root Certificate to version 20170717. Required to enable&lt;br&gt;
Email&lt;br&gt;
recipients using &#x27;Validate server certificate&#x27;.&lt;br&gt;
&lt;br&gt;
8.45.3:C31&lt;br&gt;
Added support for certificates with expiration dates beyond year 2038.&lt;br&gt;
&lt;br&gt;
8.45.3:C32&lt;br&gt;
Support for HTTP keep-alive connections via ONVIF. lowers the risk for security&lt;br&gt;
focused network infrastructure or unstable networks to block or drop PTZ control&lt;br&gt;
commands.&lt;br&gt;
&lt;br&gt;
8.45.3:C33&lt;br&gt;
Corrected an issue that let the PTZ control queue ignore an anonymous viewer account and deny PTZ control.&lt;br&gt;
&lt;br&gt;
8.45.3:C34&lt;br&gt;
Improved user notification when creating a E-mail recipient that contains wrong domain&lt;br&gt;
information.&lt;br&gt;
&lt;br&gt;
8.45.3:C35&lt;br&gt;
Improved camera stability when metadata is used.&lt;br&gt;
&lt;br&gt;
8.45.3:C36&lt;br&gt;
Improved camera stability when using liblicensekey.&lt;br&gt;
&lt;br&gt;
8.45.3:C37&lt;br&gt;
The correct IPv6 router IP-addresses are now shown correctly in the network interface of the web-interface and in ONVIF responses.&lt;br&gt;
&lt;br&gt;
8.45.3:C38&lt;br&gt;
Adjusted the system log messages for the NTP daemon to be more specific and highlight that there is a time drift instead of an &#x22;adjustment&#x22;.&lt;br&gt;
&lt;br&gt;
8.45.3:C39&lt;br&gt;
Upgrade SSL negotiation in the AVHS client to SSLv23 instead of the deprecated TLSv1.&lt;br&gt;
&lt;br&gt;
8.45.3:C40&lt;br&gt;
The triple DES cipher is not selected as DEFAULT in the HTTPS settings to increase overall cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:C41&lt;br&gt;
Updated the Portable UPnP SDK to 1.6.22 to increase the overall cyber security level.&lt;br&gt;
&lt;br&gt;
8.45.3:C42&lt;br&gt;
Improved stability for TCP notifications.&lt;br&gt;
&lt;br&gt;
8.45.3:C43&lt;br&gt;
Improved camera stability when TriggerData is used.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">V5915 8.45.4.5</guid>
      <pubDate>Fri, 04 Jul 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q8741-E, version 7.15.7.1</title>
      <link>https://www.axis.com/support/firmware#350bec156f1d5ad3b0426643f030fff5</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions given in howtoupgrade.txt,&lt;br&gt;
which is included in the firmware folder or according to instructions at&lt;br&gt;
https://www.axis.com/support/firmware.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:F1&lt;br&gt;
Added support for AXIS TQ1818-E Positioning Unit.&lt;br&gt;
&lt;br&gt;
Cybersecurity&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:S1&lt;br&gt;
Updated cURL to version 8.12.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S2&lt;br&gt;
Updated OpenSSL to version 1.1.1zb to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S3&lt;br&gt;
Updated OpenSSH to version 10.0p1, addressing CVE-2025-32728 and CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S4&lt;br&gt;
Addressed CVE-2025-0325. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S5&lt;br&gt;
Addressed CVE-2024-47262. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S6&lt;br&gt;
Updated glib, addressing CVE-2024-52533 (https://www.cve.org/CVERecord?id=CVE-2024-52533).&lt;br&gt;
&lt;br&gt;
7.15.7.1:S7&lt;br&gt;
Addressed CVE-2024-6173. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:C1&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C2&lt;br&gt;
Improved stability of &#x22;maskd&#x22; and &#x22;blinkenlights&#x22; daemons when handling&lt;br&gt;
oversized messages.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C3&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous&lt;br&gt;
recording.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C4&lt;br&gt;
Corrected an issue in recording-indexer caused by corrupt database version.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q8741-E 7.15.7.1</guid>
      <pubDate>Wed, 21 May 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q8741-LE, version 7.15.7.1</title>
      <link>https://www.axis.com/support/firmware#350bec156f1d5ad3b0426643f030fff5</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions given in howtoupgrade.txt,&lt;br&gt;
which is included in the firmware folder or according to instructions at&lt;br&gt;
https://www.axis.com/support/firmware.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:F1&lt;br&gt;
Added support for AXIS TQ1818-E Positioning Unit.&lt;br&gt;
&lt;br&gt;
Cybersecurity&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:S1&lt;br&gt;
Updated cURL to version 8.12.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S2&lt;br&gt;
Updated OpenSSL to version 1.1.1zb to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S3&lt;br&gt;
Updated OpenSSH to version 10.0p1, addressing CVE-2025-32728 and CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S4&lt;br&gt;
Addressed CVE-2025-0325. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S5&lt;br&gt;
Addressed CVE-2024-47262. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S6&lt;br&gt;
Updated glib, addressing CVE-2024-52533 (https://www.cve.org/CVERecord?id=CVE-2024-52533).&lt;br&gt;
&lt;br&gt;
7.15.7.1:S7&lt;br&gt;
Addressed CVE-2024-6173. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:C1&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C2&lt;br&gt;
Improved stability of &#x22;maskd&#x22; and &#x22;blinkenlights&#x22; daemons when handling&lt;br&gt;
oversized messages.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C3&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous&lt;br&gt;
recording.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C4&lt;br&gt;
Corrected an issue in recording-indexer caused by corrupt database version.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q8741-LE 7.15.7.1</guid>
      <pubDate>Wed, 21 May 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q8742-E, version 7.15.7.1</title>
      <link>https://www.axis.com/support/firmware#3ead846afb7c0c52b9a1e9d1892ea89b</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions given in howtoupgrade.txt,&lt;br&gt;
which is included in the firmware folder or according to instructions at&lt;br&gt;
https://www.axis.com/support/firmware.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:F1&lt;br&gt;
Added support for AXIS TQ1818-E Positioning Unit.&lt;br&gt;
&lt;br&gt;
Cybersecurity&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:S1&lt;br&gt;
Updated cURL to version 8.12.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S2&lt;br&gt;
Updated OpenSSL to version 1.1.1zb to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S3&lt;br&gt;
Updated OpenSSH to version 10.0p1, addressing CVE-2025-32728 and CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S4&lt;br&gt;
Addressed CVE-2025-0325. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S5&lt;br&gt;
Addressed CVE-2024-47262. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S6&lt;br&gt;
Updated glib, addressing CVE-2024-52533 (https://www.cve.org/CVERecord?id=CVE-2024-52533).&lt;br&gt;
&lt;br&gt;
7.15.7.1:S7&lt;br&gt;
Addressed CVE-2024-6173. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:C1&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C2&lt;br&gt;
Improved stability of &#x22;maskd&#x22; and &#x22;blinkenlights&#x22; daemons when handling&lt;br&gt;
oversized messages.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C3&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous&lt;br&gt;
recording.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C4&lt;br&gt;
Corrected an issue in recording-indexer caused by corrupt database version.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q8742-E 7.15.7.1</guid>
      <pubDate>Wed, 21 May 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q8742-E_Zoom, version 7.15.7.1</title>
      <link>https://www.axis.com/support/firmware#6676a29eaa7da566ec4c41ad87a813ae</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions given in howtoupgrade.txt,&lt;br&gt;
which is included in the firmware folder or according to instructions at&lt;br&gt;
https://www.axis.com/support/firmware.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:F1&lt;br&gt;
Added support for AXIS TQ1818-E Positioning Unit.&lt;br&gt;
&lt;br&gt;
Cybersecurity&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:S1&lt;br&gt;
Updated cURL to version 8.12.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S2&lt;br&gt;
Updated OpenSSL to version 1.1.1zb to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S3&lt;br&gt;
Updated OpenSSH to version 10.0p1, addressing CVE-2025-32728 and CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S4&lt;br&gt;
Addressed CVE-2025-0325. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S5&lt;br&gt;
Addressed CVE-2024-47262. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S6&lt;br&gt;
Updated glib, addressing CVE-2024-52533 (https://www.cve.org/CVERecord?id=CVE-2024-52533).&lt;br&gt;
&lt;br&gt;
7.15.7.1:S7&lt;br&gt;
Addressed CVE-2024-6173. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:C1&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C2&lt;br&gt;
Improved stability of &#x22;maskd&#x22; and &#x22;blinkenlights&#x22; daemons when handling&lt;br&gt;
oversized messages.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C3&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous&lt;br&gt;
recording.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C4&lt;br&gt;
Corrected an issue in recording-indexer caused by corrupt database version.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q8742-E_Zoom 7.15.7.1</guid>
      <pubDate>Wed, 21 May 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q8742-LE, version 7.15.7.1</title>
      <link>https://www.axis.com/support/firmware#3ead846afb7c0c52b9a1e9d1892ea89b</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions given in howtoupgrade.txt,&lt;br&gt;
which is included in the firmware folder or according to instructions at&lt;br&gt;
https://www.axis.com/support/firmware.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:F1&lt;br&gt;
Added support for AXIS TQ1818-E Positioning Unit.&lt;br&gt;
&lt;br&gt;
Cybersecurity&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:S1&lt;br&gt;
Updated cURL to version 8.12.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S2&lt;br&gt;
Updated OpenSSL to version 1.1.1zb to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S3&lt;br&gt;
Updated OpenSSH to version 10.0p1, addressing CVE-2025-32728 and CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S4&lt;br&gt;
Addressed CVE-2025-0325. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S5&lt;br&gt;
Addressed CVE-2024-47262. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S6&lt;br&gt;
Updated glib, addressing CVE-2024-52533 (https://www.cve.org/CVERecord?id=CVE-2024-52533).&lt;br&gt;
&lt;br&gt;
7.15.7.1:S7&lt;br&gt;
Addressed CVE-2024-6173. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:C1&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C2&lt;br&gt;
Improved stability of &#x22;maskd&#x22; and &#x22;blinkenlights&#x22; daemons when handling&lt;br&gt;
oversized messages.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C3&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous&lt;br&gt;
recording.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C4&lt;br&gt;
Corrected an issue in recording-indexer caused by corrupt database version.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q8742-LE 7.15.7.1</guid>
      <pubDate>Wed, 21 May 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q8742-LE_Zoom, version 7.15.7.1</title>
      <link>https://www.axis.com/support/firmware#6676a29eaa7da566ec4c41ad87a813ae</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Upgrade recommendations&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
Upgrade the firmware according to the instructions given in howtoupgrade.txt,&lt;br&gt;
which is included in the firmware folder or according to instructions at&lt;br&gt;
https://www.axis.com/support/firmware.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:F1&lt;br&gt;
Added support for AXIS TQ1818-E Positioning Unit.&lt;br&gt;
&lt;br&gt;
Cybersecurity&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:S1&lt;br&gt;
Updated cURL to version 8.12.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S2&lt;br&gt;
Updated OpenSSL to version 1.1.1zb to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S3&lt;br&gt;
Updated OpenSSH to version 10.0p1, addressing CVE-2025-32728 and CVE-2025-26466.&lt;br&gt;
&lt;br&gt;
7.15.7.1:S4&lt;br&gt;
Addressed CVE-2025-0325. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S5&lt;br&gt;
Addressed CVE-2024-47262. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
7.15.7.1:S6&lt;br&gt;
Updated glib, addressing CVE-2024-52533 (https://www.cve.org/CVERecord?id=CVE-2024-52533).&lt;br&gt;
&lt;br&gt;
7.15.7.1:S7&lt;br&gt;
Addressed CVE-2024-6173. For more information, please visit the Axis vulnerability management portal (https://www.axis.com/support/cybersecurity/vulnerability-management).&#x22;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
7.15.7.1:C1&lt;br&gt;
Corrected an issue where SMTP DATA messages were incorrectly terminated, causing&lt;br&gt;
compatibility issues with strict SMTP servers like Postfix.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C2&lt;br&gt;
Improved stability of &#x22;maskd&#x22; and &#x22;blinkenlights&#x22; daemons when handling&lt;br&gt;
oversized messages.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C3&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous&lt;br&gt;
recording.&lt;br&gt;
&lt;br&gt;
7.15.7.1:C4&lt;br&gt;
Corrected an issue in recording-indexer caused by corrupt database version.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q8742-LE_Zoom 7.15.7.1</guid>
      <pubDate>Wed, 21 May 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS T8705, version 6.0.6</title>
      <link>https://www.axis.com/support/firmware#04f912bb7a8f288d39cc1f1a59ca0331</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
This firmware needs 5.1.8.5 or later installed on the unit&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
New features in 6.0.6 since 6.0.5&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
6.0.6:F1&lt;br&gt;
Axis video sources have support for cameras with rate control version 2.0 that&lt;br&gt;
was introduced in AXIS OS 12.0.&lt;br&gt;
&lt;br&gt;
6.0.6:F2&lt;br&gt;
Axis video sources have support for cameras that are configured with the new &lt;br&gt;
authentication policy named &#x22;Recommended&#x22; that was introduced in AXIS OS 12.1 &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
New features in 6.0.5 since 6.0.2&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
6.0.5:F1&lt;br&gt;
Accepting hostnames when adding Axis video sources from the local network.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
New features in 6.0.1 since 6.0.0&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
6.0.1:F1&lt;br&gt;
Improved webserver and filesystem robustness to increase overall minimum &lt;br&gt;
cybersecurity level.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
New features in 6.0.0 since 5.1.8.5&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
6.0.0:F1&lt;br&gt;
New Linux based platform that is easier to update and maintain than the &lt;br&gt;
previous platform.&lt;br&gt;
&lt;br&gt;
6.0.0:F2&lt;br&gt;
The web interface has been updated and is now based on Axis Device Assistant.&lt;br&gt;
&lt;br&gt;
6.0.0:F3&lt;br&gt;
The new web interface has enhanced the way the users can configure views. It is &lt;br&gt;
possible to create multiviews and individually assign a video source to an area &lt;br&gt;
of the view. Views can be named to identify them more easily.&lt;br&gt;
&lt;br&gt;
6.0.0:F4&lt;br&gt;
More options to configure a sequence view. The sequence order can easily be &lt;br&gt;
changed, and each view can have an individual duration in the sequence. It is &lt;br&gt;
also possible to mix single views with multiviews in the sequence.&lt;br&gt;
&lt;br&gt;
6.0.0:F5&lt;br&gt;
It is possible to set a maximum bitrate per profile for Axis cameras. This &lt;br&gt;
ensures that the decoder will not be choked with too much video data and &lt;br&gt;
prevent artifacts.&lt;br&gt;
&lt;br&gt;
6.0.0:F6&lt;br&gt;
Implemented firmware rollback which makes it possible to roll back to a &lt;br&gt;
previous installed 6.x firmware. Rollback to firmware&#x27;s on the 5.x platform &lt;br&gt;
is not supported.&lt;br&gt;
&lt;br&gt;
6.0.0:F7&lt;br&gt;
Possibility to configure the desired latency in an interval ranging from &lt;br&gt;
100ms - 2000ms with the parameter root.Decoder.Latency, available in plain &lt;br&gt;
config. High decoding or network load might still lead to higher latencies than &lt;br&gt;
configured.&lt;br&gt;
&lt;br&gt;
6.0.0:F8&lt;br&gt;
Added possibility to prevent screen tearing by enabling vertical sync with the &lt;br&gt;
parameter root.Decoder.Vsync, available in plain config. This should only be &lt;br&gt;
used be used for single views as the decoder can only effectively sync one view &lt;br&gt;
with the monitor.&lt;br&gt;
&lt;br&gt;
6.0.0:F9&lt;br&gt;
A user will now be assigned a privilege level (Administrator/Operator/Viewer).&lt;br&gt;
&lt;br&gt;
6.0.0:F10&lt;br&gt;
New format for exporting configuration files. Implemented the possibility to &lt;br&gt;
select any subset of &#x22;Video Sources&#x22;, &#x22;Display Configuration&#x22;, &lt;br&gt;
&#x22;System Settings&#x22; and &#x22;Users&#x22; for exporting. It is still possible to import &lt;br&gt;
configurations from the 5.x platform.&lt;br&gt;
&lt;br&gt;
6.0.0:F11&lt;br&gt;
Configuring parameters through the param.cgi API is now possible through the &lt;br&gt;
web interface&#x27;s &#x22;Plain config&#x22; page. Added param.cgi action &#x22;listdefinitions&#x22;.&lt;br&gt;
&lt;br&gt;
6.0.0:F12&lt;br&gt;
Implemented the possibility to restart the decoding process via API call&lt;br&gt;
&lt;br&gt;
6.0.0:F13&lt;br&gt;
Implemented ONVIF API for uploading pkcs12 certificates (LoadPkcs12Request) &lt;br&gt;
and for downloading pkcs12 signing requests (GetPkcs10Request2). &lt;br&gt;
Added ONVIF method for downloading certificate information &lt;br&gt;
(GetCertificateInformation).&lt;br&gt;
&lt;br&gt;
6.0.0:F14&lt;br&gt;
Implemented VAPIX API apidiscovery.cgi&lt;br&gt;
The AXIS API Discovery service makes it possible to retrieve information about &lt;br&gt;
APIs supported on their products&lt;br&gt;
https://www.axis.com/vapix-library/subjects/t10175981/section/t10131704/display&lt;br&gt;
&lt;br&gt;
6.0.0:F15&lt;br&gt;
Implemented VAPIX API time.cgi&lt;br&gt;
The Time API makes it possible to get and set time, date and time zone &lt;br&gt;
information&lt;br&gt;
https://www.axis.com/vapix-library/subjects/t10175981/section/t10140267/display&lt;br&gt;
&lt;br&gt;
6.0.0:F16&lt;br&gt;
Implemented VAPIX API ntp.cgi&lt;br&gt;
&lt;br&gt;
6.0.0:F17&lt;br&gt;
Implemented VAPIX API firmwaremangement.cgi&lt;br&gt;
&lt;br&gt;
6.0.0:F18&lt;br&gt;
Implemented VAPIX API network_settings.cgi&lt;br&gt;
&lt;br&gt;
6.0.0:F19&lt;br&gt;
Implemented VAPIX API ssh.cgi&lt;br&gt;
&lt;br&gt;
6.0.0:F20&lt;br&gt;
Implemented VAPIX API basicdeviceinfo.cgi&lt;br&gt;
&lt;br&gt;
6.0.0:F22&lt;br&gt;
Implemented VAPIX API upnp.cgi&lt;br&gt;
&lt;br&gt;
6.0.0:F23&lt;br&gt;
Implemented VAPIX API mdnssd.cgi&lt;br&gt;
&lt;br&gt;
6.0.0:F24&lt;br&gt;
Implemented VAPIX API systemready.cgi&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.0.6 since 6.0.5&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
6.0.6:C1&lt;br&gt;
Axis video sources that were based on companion cameras lost their companion &lt;br&gt;
status after editing the video source causing the decoder to not be able to pull&lt;br&gt;
a video stream from the video source.&lt;br&gt;
&lt;br&gt;
6.0.6:C2&lt;br&gt;
Issue with enabling HTTPS from Axis Device Management.&lt;br&gt;
&lt;br&gt;
6.0.6:C3&lt;br&gt;
Increased the number of characters from 32 to 64 in the common name (CN) of &lt;br&gt;
self-signed certificates generated by the decoder.&lt;br&gt;
&lt;br&gt;
6.0.6:C4&lt;br&gt;
Better support for MJPEG codec.&lt;br&gt;
&lt;br&gt;
6.0.6:C5&lt;br&gt;
The actual link speed would in some cases not be the same as the one set &lt;br&gt;
through the user interface.&lt;br&gt;
&lt;br&gt;
6.0.6:C6&lt;br&gt;
A rounding error caused a flickering line in some layouts.&lt;br&gt;
&lt;br&gt;
6.0.6:C7&lt;br&gt;
Connection to the decoder could be lost when it was configured to be used in an&lt;br&gt;
802.1x secured network.&lt;br&gt;
&lt;br&gt;
6.0.6:C8&lt;br&gt;
The functionality that restores a configuration crashed when a generic video &lt;br&gt;
source was included in the backup file.&lt;br&gt;
&lt;br&gt;
6.0.6:C9&lt;br&gt;
General security improvements.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">T8705 6.0.6</guid>
      <pubDate>Mon, 19 May 2025 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS F41, version 6.50.5.20</title>
      <link>https://www.axis.com/support/firmware#641d35d1c7d5d2334f5b9864f91b3929</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.20 since 6.50.5.19&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.20:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C02&lt;br&gt;
Updated wpa-supplicant to version 2.11 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C03&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C04&lt;br&gt;
Addressed CVE-2024-47262. This CVE will be externally disclosed on 4 March 2025. More&lt;br&gt;
detailed information will follow at that time. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C05&lt;br&gt;
Updated cURL to version 8.11.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">F41 6.50.5.20</guid>
      <pubDate>Tue, 04 Mar 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS M3026, version 6.50.5.20</title>
      <link>https://www.axis.com/support/firmware#4c2617d904227ac526074207b416d3ac</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.20 since 6.50.5.19&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.20:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C02&lt;br&gt;
Updated wpa-supplicant to version 2.11 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C03&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C04&lt;br&gt;
Addressed CVE-2024-47262. This CVE will be externally disclosed on 4 March 2025. More&lt;br&gt;
detailed information will follow at that time. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C05&lt;br&gt;
Updated cURL to version 8.11.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M3026 6.50.5.20</guid>
      <pubDate>Tue, 04 Mar 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q1765, version 6.50.5.20</title>
      <link>https://www.axis.com/support/firmware#2fb6a57cbb4a3319ad26dee4b2e828e4</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.20 since 6.50.5.19&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.20:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C02&lt;br&gt;
Updated wpa-supplicant to version 2.11 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C03&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C04&lt;br&gt;
Addressed CVE-2024-47262. This CVE will be externally disclosed on 4 March 2025. More&lt;br&gt;
detailed information will follow at that time. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C05&lt;br&gt;
Updated cURL to version 8.11.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1765 6.50.5.20</guid>
      <pubDate>Tue, 04 Mar 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6000-E, version 6.50.5.20</title>
      <link>https://www.axis.com/support/firmware#ef6190d93a5c32b46f3a6e8572529efc</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.20 since 6.50.5.19&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.20:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C02&lt;br&gt;
Updated wpa-supplicant to version 2.11 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C03&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C04&lt;br&gt;
Addressed CVE-2024-47262. This CVE will be externally disclosed on 4 March 2025. More&lt;br&gt;
detailed information will follow at that time. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C05&lt;br&gt;
Updated cURL to version 8.11.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6000-E 6.50.5.20</guid>
      <pubDate>Tue, 04 Mar 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6000-E_Mk_II, version 6.50.5.20</title>
      <link>https://www.axis.com/support/firmware#ef6190d93a5c32b46f3a6e8572529efc</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.20 since 6.50.5.19&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.20:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C02&lt;br&gt;
Updated wpa-supplicant to version 2.11 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C03&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C04&lt;br&gt;
Addressed CVE-2024-47262. This CVE will be externally disclosed on 4 March 2025. More&lt;br&gt;
detailed information will follow at that time. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C05&lt;br&gt;
Updated cURL to version 8.11.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6000-E_Mk_II 6.50.5.20</guid>
      <pubDate>Tue, 04 Mar 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q8414-LVS, version 6.50.5.20</title>
      <link>https://www.axis.com/support/firmware#511651bd1a381e60c19164c7a6f46197</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.20 since 6.50.5.19&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.20:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C02&lt;br&gt;
Updated wpa-supplicant to version 2.11 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C03&lt;br&gt;
Improved &#x22;Start Recording&#x22; functionality to prevent simultaneous continuous recording.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C04&lt;br&gt;
Addressed CVE-2024-47262. This CVE will be externally disclosed on 4 March 2025. More&lt;br&gt;
detailed information will follow at that time. For more information, please visit the Axis&lt;br&gt;
vulnerability management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.20:C05&lt;br&gt;
Updated cURL to version 8.11.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q8414-LVS 6.50.5.20</guid>
      <pubDate>Tue, 04 Mar 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS M5055, version 6.53.5.19</title>
      <link>https://www.axis.com/support/firmware#d07f4b1232d192b667ea3dd35a4f2203</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
Corrections in 6.53.5.19 since 6.53.5.7&lt;br&gt;
======================================&lt;br&gt;
&lt;br&gt;
6.53.5.19:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C02&lt;br&gt;
Corrected an issue where SSH users who used ssh-copy-id to install their SSH key as&lt;br&gt;
authorized on the device would unintentionally still have SSH access after a factory&lt;br&gt;
default with keeping IP settings.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C03&lt;br&gt;
Corrected an issue where the O3C oak.cgi could no longer read proxypassword, preventing&lt;br&gt;
users from accessing proxy with user/password set.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C04&lt;br&gt;
Addressed a vulnerability allowing DHCPv6 lease injection through unvalidated input&lt;br&gt;
parameters.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C05&lt;br&gt;
The parameter RemoteService.ProxyPassword that controls the proxy password has been masked&lt;br&gt;
and made unreadable for security reasons.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C06&lt;br&gt;
Updated libssh2 to version 1.11.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C07&lt;br&gt;
Updated OpenSSH to version 9.8p1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C08&lt;br&gt;
Added DNS cache for O3C client to reduce the DNS lookup.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C09&lt;br&gt;
Addressed CVE-2024-6509. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C10&lt;br&gt;
Addressed CVE-2023-52160 in wpa-supplicant to increase overall minimum cybersecurity level&lt;br&gt;
&lt;br&gt;
6.53.5.19:C11&lt;br&gt;
Addressed CVE-2024-6173. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C12&lt;br&gt;
Updated cURL to version 8.9.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C13&lt;br&gt;
Updated OpenSSL to version 1.1.1za to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C14&lt;br&gt;
Improved stability and reliability of the certificate management service.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C15&lt;br&gt;
Updated Apache to version 2.4.62 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M5055 6.53.5.19</guid>
      <pubDate>Thu, 20 Feb 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS M5065, version 6.53.5.19</title>
      <link>https://www.axis.com/support/firmware#07224c9f98caf615d8359fd8850dfb79</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.53.5.19 since 6.53.5.7&lt;br&gt;
======================================&lt;br&gt;
&lt;br&gt;
6.53.5.19:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C02&lt;br&gt;
Corrected an issue where SSH users who used ssh-copy-id to install their SSH key as&lt;br&gt;
authorized on the device would unintentionally still have SSH access after a factory&lt;br&gt;
default with keeping IP settings.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C03&lt;br&gt;
Corrected an issue where the O3C oak.cgi could no longer read proxypassword, preventing&lt;br&gt;
users from accessing proxy with user/password set.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C04&lt;br&gt;
Addressed a vulnerability allowing DHCPv6 lease injection through unvalidated input&lt;br&gt;
parameters.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C05&lt;br&gt;
The parameter RemoteService.ProxyPassword that controls the proxy password has been masked&lt;br&gt;
and made unreadable for security reasons.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C06&lt;br&gt;
Updated libssh2 to version 1.11.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C07&lt;br&gt;
Updated OpenSSH to version 9.8p1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C08&lt;br&gt;
Added DNS cache for O3C client to reduce the DNS lookup.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C09&lt;br&gt;
Addressed CVE-2024-6509. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C10&lt;br&gt;
Addressed CVE-2023-52160 in wpa-supplicant to increase overall minimum cybersecurity level&lt;br&gt;
&lt;br&gt;
6.53.5.19:C11&lt;br&gt;
Addressed CVE-2024-6173. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C12&lt;br&gt;
Updated cURL to version 8.9.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C13&lt;br&gt;
Updated OpenSSL to version 1.1.1za to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C14&lt;br&gt;
Improved stability and reliability of the certificate management service.&lt;br&gt;
&lt;br&gt;
6.53.5.19:C15&lt;br&gt;
Updated Apache to version 2.4.62 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M5065 6.53.5.19</guid>
      <pubDate>Thu, 20 Feb 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A8004-VE, version 1.65.14</title>
      <link>https://www.axis.com/support/firmware#fb78a517cea4a179833f626d7eef1ec1</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 1.65.14 since 1.65.13&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
1.65.14:C01&lt;br&gt;
Updated Apache to version 2.4.62 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
1.65.14:C02&lt;br&gt;
Updated OpenSSL to version 1.1.1za to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
1.65.14:C03&lt;br&gt;
Updated cURL to version 8.10.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
1.65.14:C04&lt;br&gt;
Improved stability and reliability of the certificate management service.&lt;br&gt;
&lt;br&gt;
1.65.14:C05&lt;br&gt;
Multiple SIP improvements.&lt;br&gt;
&lt;br&gt;
1.65.14:C06&lt;br&gt;
Fixed problem with editing SIP settings in some browsers.&lt;br&gt;
&lt;br&gt;
1.65.14:C07&lt;br&gt;
Improved LED handling.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A8004-VE 1.65.14</guid>
      <pubDate>Wed, 22 Jan 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A8105-E, version 1.65.14</title>
      <link>https://www.axis.com/support/firmware#5c6a78a4fbf1d7b29cef65288b2d4d97</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 1.65.14 since 1.65.13&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
1.65.14:C01&lt;br&gt;
Updated Apache to version 2.4.62 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
1.65.14:C02&lt;br&gt;
Updated OpenSSL to version 1.1.1za to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
1.65.14:C03&lt;br&gt;
Updated cURL to version 8.10.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
1.65.14:C04&lt;br&gt;
Improved stability and reliability of the certificate management service.&lt;br&gt;
&lt;br&gt;
1.65.14:C05&lt;br&gt;
Multiple SIP improvements.&lt;br&gt;
&lt;br&gt;
1.65.14:C06&lt;br&gt;
Fixed problem with editing SIP settings in some browsers.&lt;br&gt;
&lt;br&gt;
1.65.14:C07&lt;br&gt;
Improved LED handling.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A8105-E 1.65.14</guid>
      <pubDate>Wed, 22 Jan 2025 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q1765-LE, version 6.50.5.19</title>
      <link>https://www.axis.com/support/firmware#d93e3d38baed2a1fd0f0a3189e31902e</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.19 since 6.50.5.18&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.19:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C02&lt;br&gt;
Corrected an issue where SSH users who used ssh-copy-id to install their SSH key as&lt;br&gt;
authorized on the device would unintentionally still have SSH access after a factory&lt;br&gt;
default with keeping IP settings.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C03&lt;br&gt;
Corrected an issue where the O3C oak.cgi could no longer read proxypassword, preventing&lt;br&gt;
users from accessing proxy with user/password set.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C04&lt;br&gt;
Addressed a vulnerability allowing DHCPv6 lease injection through unvalidated input&lt;br&gt;
parameters.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C05&lt;br&gt;
The parameter RemoteService.ProxyPassword that controls the proxy password has been masked&lt;br&gt;
and made unreadable for security reasons.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C06&lt;br&gt;
Updated libssh2 to version 1.11.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C07&lt;br&gt;
Updated OpenSSH to version 9.8p1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C08&lt;br&gt;
Added DNS cache for O3C client to reduce the DNS lookup.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C09&lt;br&gt;
Addressed CVE-2024-6509. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C10&lt;br&gt;
Addressed CVE-2023-52160 in wpa-supplicant to increase overall minimum cybersecurity level&lt;br&gt;
&lt;br&gt;
6.50.5.19:C11&lt;br&gt;
Addressed CVE-2024-6173. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C12&lt;br&gt;
Updated cURL to version 8.9.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C13&lt;br&gt;
Updated OpenSSL to version 1.1.1za to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C14&lt;br&gt;
Improved stability and reliability of the certificate management service.&lt;br&gt;
&lt;br&gt;
6.50.5.19:C15&lt;br&gt;
Updated Apache to version 2.4.62 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1765-LE 6.50.5.19</guid>
      <pubDate>Tue, 08 Oct 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS A9161, version 1.84.4</title>
      <link>https://www.axis.com/support/firmware#36633fae977a57f733f4a65244d43bdd</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
This firmware is based on the AXIS OS LTS 2018 - 8.40 &lt;br&gt;
For more detailed information on this please see the release notes at&lt;br&gt;
help.axis.com/en-us/axis-os-release-notes&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 1.84.4&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 1.84.4&lt;br&gt;
================================================================================ &lt;br&gt;
1.84.4:C1&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 1.84.4&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A9161 1.84.4</guid>
      <pubDate>Mon, 27 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS A9188, version 1.84.4</title>
      <link>https://www.axis.com/support/firmware#36633fae977a57f733f4a65244d43bdd</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
This firmware is based on the AXIS OS LTS 2018 - 8.40 &lt;br&gt;
For more detailed information on this please see the release notes at&lt;br&gt;
help.axis.com/en-us/axis-os-release-notes&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 1.84.4&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 1.84.4&lt;br&gt;
================================================================================ &lt;br&gt;
1.84.4:C1&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 1.84.4&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A9188 1.84.4</guid>
      <pubDate>Mon, 27 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS A9188-VE, version 1.84.4</title>
      <link>https://www.axis.com/support/firmware#36633fae977a57f733f4a65244d43bdd</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
========================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see:&lt;br&gt;
https://www.axis.com/support/product-security&lt;br&gt;
&lt;br&gt;
This firmware is based on the AXIS OS LTS 2018 - 8.40 &lt;br&gt;
For more detailed information on this please see the release notes at&lt;br&gt;
help.axis.com/en-us/axis-os-release-notes&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Features in 1.84.4&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 1.84.4&lt;br&gt;
================================================================================ &lt;br&gt;
1.84.4:C1&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability management portal.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Limitations in 1.84.4&lt;br&gt;
================================================================================&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A9188-VE 1.84.4</guid>
      <pubDate>Mon, 27 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS M2014-E, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#c9ba40d7ffa3a86827b1893235623e1a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M2014-E 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS M3024-L, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#71ccea0eb4dbb8f6acee47962ae206f2</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M3024-L 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS M3025, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#fd07d1256f833525607bd52ab9e8a242</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M3025 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS M7010, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#c7bdabff3aa775994eb9e8b3cf910eaa</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M7010 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS M7014, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#c7bdabff3aa775994eb9e8b3cf910eaa</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M7014 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS M7016, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#0183413805f97ecb8e9832b812ca0845</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M7016 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P1204, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#c9ba40d7ffa3a86827b1893235623e1a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1204 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P1214, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#c9ba40d7ffa3a86827b1893235623e1a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1214 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P1214-E, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#c9ba40d7ffa3a86827b1893235623e1a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1214-E 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P1224-E, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#c9ba40d7ffa3a86827b1893235623e1a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1224-E 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P3707-PE, version 6.50.5.18</title>
      <link>https://www.axis.com/support/firmware#ea1c9d9107534c472dffe70a07c7ba48</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.18 since 6.50.5.17&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.18:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.18:C02&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.18:C03&lt;br&gt;
Updated cURL to version 8.7.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.18:C04&lt;br&gt;
Updated OpenSSH to version 9.6p1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3707-PE 6.50.5.18</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P3904-R, version 6.50.5.18</title>
      <link>https://www.axis.com/support/firmware#c516c13534589d852e62be28a846c233</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.18 since 6.50.5.17&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.18:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.18:C02&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.18:C03&lt;br&gt;
Updated cURL to version 8.7.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.18:C04&lt;br&gt;
Updated OpenSSH to version 9.6p1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3904-R 6.50.5.18</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P3905-R, version 6.50.5.18</title>
      <link>https://www.axis.com/support/firmware#c516c13534589d852e62be28a846c233</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.18 since 6.50.5.17&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.18:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.18:C02&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
6.50.5.18:C03&lt;br&gt;
Updated cURL to version 8.7.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.18:C04&lt;br&gt;
Updated OpenSSH to version 9.6p1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3905-R 6.50.5.18</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P7210, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#313aa3d8a4938b89d587ba0a605e7cda</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P7210 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P7214, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#313aa3d8a4938b89d587ba0a605e7cda</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P7214 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P7216, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#9abfe2c472bcdf7596b84f544e100353</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P7216 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P8524, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#c9ba40d7ffa3a86827b1893235623e1a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P8524 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q7401, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#03e8bf1cf01bb9bea1465ff8af6bc0c7</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q7401 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q7414, version 5.51.7.8</title>
      <link>https://www.axis.com/support/firmware#4711352183e2fa45cd76f0bbd7aa80f2</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.8 since 5.51.7.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.8:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q7414 5.51.7.8</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q7424-R_Mk_II, version 5.51.3.10</title>
      <link>https://www.axis.com/support/firmware#2154cc0d3e3f618138d99654b86538f3</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.3.10 since 5.51.3.9&lt;br&gt;
========================================&lt;br&gt;
&lt;br&gt;
5.51.3.10:C01&lt;br&gt;
Addressed CVE-2024-0066. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q7424-R_Mk_II 5.51.3.10</guid>
      <pubDate>Wed, 22 May 2024 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS S2208, version 1.2.2</title>
      <link>https://www.axis.com/support/firmware#85188dd0e5a35cab48b5ed28486b909e</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Changes made in 1.2.2&lt;br&gt;
=========================&lt;br&gt;
* New functionality&lt;br&gt;
  - HTTPS connection enabled by default&lt;br&gt;
  - Added possibility to redirect from HTTP to HTTPS connection&lt;br&gt;
&lt;br&gt;
* Improved security&lt;br&gt;
  - Support for TLS 1.3.&lt;br&gt;
  - Unable to login via HTTP after disabling HTTPS.&lt;br&gt;
  - Upgraded 3rd party libraries.&lt;br&gt;
&lt;br&gt;
* Other &lt;br&gt;
  - Support for new internal hardware.&lt;br&gt;
  - Look for and detect other DHCP servers only when the DHCP server is enabled.&lt;br&gt;
  - Limit the amount of log entries that can be exported to 3000.&lt;br&gt;
  - Adjust the configurable date-time to 1980 ~ 2099.&lt;br&gt;
  - Improved user interface and error handling on date and time settings.&lt;br&gt;
  - Improved handling of invalid firmware files in the firmware upgrade process.&lt;br&gt;
  - Keep use of the uploaded SSL certificate after firmware upgrade.&lt;br&gt;
&lt;br&gt;
* Bug fixes&lt;br&gt;
  - Solved an issue where the loading bar was not visible when changing DHCP settings.&lt;br&gt;
  - Solved an issue occurring when CA bundle is uploaded.&lt;br&gt;
&lt;br&gt;
* Limitations&lt;br&gt;
  - Multiple Languages&lt;br&gt;
      Refreshing the page will show English temporary and then change to chosen one dynamically.&lt;br&gt;
  - Configurations&lt;br&gt;
      Network Settings - Management only allows to be configured as static IP.&lt;br&gt;
  - SSL Certification&lt;br&gt;
      The uploaded SSL certification will only take effect after reboot.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.2&lt;br&gt;
=========================&lt;br&gt;
* Further voltage adjustments to fix unexpected reboot of 900 MHz SoC subsystem during burning-in test. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.1&lt;br&gt;
=========================&lt;br&gt;
* Voltage adjustments to fix unexpected reboot of 900 MHz SoC subsystem during burning-in test. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.0&lt;br&gt;
=========================&lt;br&gt;
* Improved performance &lt;br&gt;
  - Significant reduced switch boot time. &lt;br&gt;
  - Improved user experience and responsiveness in Overview and Power Management pages. &lt;br&gt;
&lt;br&gt;
* New functionality&lt;br&gt;
  - Web interface auto re-fresh&lt;br&gt;
  - Multi-language support and translations&lt;br&gt;
      French, Italian, German, Spanish, Russian, Japanese&lt;br&gt;
  - Power Management   Actual consumption policy&lt;br&gt;
  - Built in Help functionality&lt;br&gt;
&lt;br&gt;
* Improved security&lt;br&gt;
  - Add cookie option &#xE2;&#x80;&#x9C;Secure&#xE2;&#x80;&#x9D;, to enhance the security of token cookies when user visit web UI via https.&lt;br&gt;
  - Enhance the security rating of TLS1.2 support of web service.&lt;br&gt;
&lt;br&gt;
* Other&lt;br&gt;
  - Add popup menu which provides logout and language options.&lt;br&gt;
  - Dynamically adjust inner width setting for 4K display.&lt;br&gt;
  - Pagination of log page&lt;br&gt;
  - Able to restore backed up settings from version 1.0.0 for the same model.&lt;br&gt;
  - Some UI adjustment to handle translations correctly&lt;br&gt;
&lt;br&gt;
* Bug fixes&lt;br&gt;
  - Fixed an issue where LLDP-Med devices weren&#xE2;&#x80;&#x99;t properly handled.&lt;br&gt;
  - Fixed an issue where some devices randomly got no hardware model and name.&lt;br&gt;
  - Fixed an issue where occasional no data communication occurred on some ports.&lt;br&gt;
  - Improved web UI scalability on resolutions greater than 1080p.&lt;br&gt;
  - Fixed missing page layout borders on Settings/Maintenance and Logs. &lt;br&gt;
  - Fixed an issue with how Edge browser is handling cache.&lt;br&gt;
  - Fixed an issue on SNMPv3 functionality.&lt;br&gt;
  - Fixed issues related to sorting on Overview- and Log page.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">S2208 1.2.2</guid>
      <pubDate>Thu, 07 Mar 2024 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS S2212, version 1.2.2</title>
      <link>https://www.axis.com/support/firmware#85188dd0e5a35cab48b5ed28486b909e</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Changes made in 1.2.2&lt;br&gt;
=========================&lt;br&gt;
* New functionality&lt;br&gt;
  - HTTPS connection enabled by default&lt;br&gt;
  - Added possibility to redirect from HTTP to HTTPS connection&lt;br&gt;
&lt;br&gt;
* Improved security&lt;br&gt;
  - Support for TLS 1.3.&lt;br&gt;
  - Unable to login via HTTP after disabling HTTPS.&lt;br&gt;
  - Upgraded 3rd party libraries.&lt;br&gt;
&lt;br&gt;
* Other &lt;br&gt;
  - Support for new internal hardware.&lt;br&gt;
  - Look for and detect other DHCP servers only when the DHCP server is enabled.&lt;br&gt;
  - Limit the amount of log entries that can be exported to 3000.&lt;br&gt;
  - Adjust the configurable date-time to 1980 ~ 2099.&lt;br&gt;
  - Improved user interface and error handling on date and time settings.&lt;br&gt;
  - Improved handling of invalid firmware files in the firmware upgrade process.&lt;br&gt;
  - Keep use of the uploaded SSL certificate after firmware upgrade.&lt;br&gt;
&lt;br&gt;
* Bug fixes&lt;br&gt;
  - Solved an issue where the loading bar was not visible when changing DHCP settings.&lt;br&gt;
  - Solved an issue occurring when CA bundle is uploaded.&lt;br&gt;
&lt;br&gt;
* Limitations&lt;br&gt;
  - Multiple Languages&lt;br&gt;
      Refreshing the page will show English temporary and then change to chosen one dynamically.&lt;br&gt;
  - Configurations&lt;br&gt;
      Network Settings - Management only allows to be configured as static IP.&lt;br&gt;
  - SSL Certification&lt;br&gt;
      The uploaded SSL certification will only take effect after reboot.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.2&lt;br&gt;
=========================&lt;br&gt;
* Further voltage adjustments to fix unexpected reboot of 900 MHz SoC subsystem during burning-in test. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.1&lt;br&gt;
=========================&lt;br&gt;
* Voltage adjustments to fix unexpected reboot of 900 MHz SoC subsystem during burning-in test. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.0&lt;br&gt;
=========================&lt;br&gt;
* Improved performance &lt;br&gt;
  - Significant reduced switch boot time. &lt;br&gt;
  - Improved user experience and responsiveness in Overview and Power Management pages. &lt;br&gt;
&lt;br&gt;
* New functionality&lt;br&gt;
  - Web interface auto re-fresh&lt;br&gt;
  - Multi-language support and translations&lt;br&gt;
      French, Italian, German, Spanish, Russian, Japanese&lt;br&gt;
  - Power Management   Actual consumption policy&lt;br&gt;
  - Built in Help functionality&lt;br&gt;
&lt;br&gt;
* Improved security&lt;br&gt;
  - Add cookie option &#xE2;&#x80;&#x9C;Secure&#xE2;&#x80;&#x9D;, to enhance the security of token cookies when user visit web UI via https.&lt;br&gt;
  - Enhance the security rating of TLS1.2 support of web service.&lt;br&gt;
&lt;br&gt;
* Other&lt;br&gt;
  - Add popup menu which provides logout and language options.&lt;br&gt;
  - Dynamically adjust inner width setting for 4K display.&lt;br&gt;
  - Pagination of log page&lt;br&gt;
  - Able to restore backed up settings from version 1.0.0 for the same model.&lt;br&gt;
  - Some UI adjustment to handle translations correctly&lt;br&gt;
&lt;br&gt;
* Bug fixes&lt;br&gt;
  - Fixed an issue where LLDP-Med devices weren&#xE2;&#x80;&#x99;t properly handled.&lt;br&gt;
  - Fixed an issue where some devices randomly got no hardware model and name.&lt;br&gt;
  - Fixed an issue where occasional no data communication occurred on some ports.&lt;br&gt;
  - Improved web UI scalability on resolutions greater than 1080p.&lt;br&gt;
  - Fixed missing page layout borders on Settings/Maintenance and Logs. &lt;br&gt;
  - Fixed an issue with how Edge browser is handling cache.&lt;br&gt;
  - Fixed an issue on SNMPv3 functionality.&lt;br&gt;
  - Fixed issues related to sorting on Overview- and Log page.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">S2212 1.2.2</guid>
      <pubDate>Thu, 07 Mar 2024 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS S2216, version 1.2.2</title>
      <link>https://www.axis.com/support/firmware#85188dd0e5a35cab48b5ed28486b909e</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Changes made in 1.2.2&lt;br&gt;
=========================&lt;br&gt;
* New functionality&lt;br&gt;
  - HTTPS connection enabled by default&lt;br&gt;
  - Added possibility to redirect from HTTP to HTTPS connection&lt;br&gt;
&lt;br&gt;
* Improved security&lt;br&gt;
  - Support for TLS 1.3.&lt;br&gt;
  - Unable to login via HTTP after disabling HTTPS.&lt;br&gt;
  - Upgraded 3rd party libraries.&lt;br&gt;
&lt;br&gt;
* Other &lt;br&gt;
  - Support for new internal hardware.&lt;br&gt;
  - Look for and detect other DHCP servers only when the DHCP server is enabled.&lt;br&gt;
  - Limit the amount of log entries that can be exported to 3000.&lt;br&gt;
  - Adjust the configurable date-time to 1980 ~ 2099.&lt;br&gt;
  - Improved user interface and error handling on date and time settings.&lt;br&gt;
  - Improved handling of invalid firmware files in the firmware upgrade process.&lt;br&gt;
  - Keep use of the uploaded SSL certificate after firmware upgrade.&lt;br&gt;
&lt;br&gt;
* Bug fixes&lt;br&gt;
  - Solved an issue where the loading bar was not visible when changing DHCP settings.&lt;br&gt;
  - Solved an issue occurring when CA bundle is uploaded.&lt;br&gt;
&lt;br&gt;
* Limitations&lt;br&gt;
  - Multiple Languages&lt;br&gt;
      Refreshing the page will show English temporary and then change to chosen one dynamically.&lt;br&gt;
  - Configurations&lt;br&gt;
      Network Settings - Management only allows to be configured as static IP.&lt;br&gt;
  - SSL Certification&lt;br&gt;
      The uploaded SSL certification will only take effect after reboot.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.2&lt;br&gt;
=========================&lt;br&gt;
* Further voltage adjustments to fix unexpected reboot of 900 MHz SoC subsystem during burning-in test. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.1&lt;br&gt;
=========================&lt;br&gt;
* Voltage adjustments to fix unexpected reboot of 900 MHz SoC subsystem during burning-in test. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.0&lt;br&gt;
=========================&lt;br&gt;
* Improved performance &lt;br&gt;
  - Significant reduced switch boot time. &lt;br&gt;
  - Improved user experience and responsiveness in Overview and Power Management pages. &lt;br&gt;
&lt;br&gt;
* New functionality&lt;br&gt;
  - Web interface auto re-fresh&lt;br&gt;
  - Multi-language support and translations&lt;br&gt;
      French, Italian, German, Spanish, Russian, Japanese&lt;br&gt;
  - Power Management   Actual consumption policy&lt;br&gt;
  - Built in Help functionality&lt;br&gt;
&lt;br&gt;
* Improved security&lt;br&gt;
  - Add cookie option &#xE2;&#x80;&#x9C;Secure&#xE2;&#x80;&#x9D;, to enhance the security of token cookies when user visit web UI via https.&lt;br&gt;
  - Enhance the security rating of TLS1.2 support of web service.&lt;br&gt;
&lt;br&gt;
* Other&lt;br&gt;
  - Add popup menu which provides logout and language options.&lt;br&gt;
  - Dynamically adjust inner width setting for 4K display.&lt;br&gt;
  - Pagination of log page&lt;br&gt;
  - Able to restore backed up settings from version 1.0.0 for the same model.&lt;br&gt;
  - Some UI adjustment to handle translations correctly&lt;br&gt;
&lt;br&gt;
* Bug fixes&lt;br&gt;
  - Fixed an issue where LLDP-Med devices weren&#xE2;&#x80;&#x99;t properly handled.&lt;br&gt;
  - Fixed an issue where some devices randomly got no hardware model and name.&lt;br&gt;
  - Fixed an issue where occasional no data communication occurred on some ports.&lt;br&gt;
  - Improved web UI scalability on resolutions greater than 1080p.&lt;br&gt;
  - Fixed missing page layout borders on Settings/Maintenance and Logs. &lt;br&gt;
  - Fixed an issue with how Edge browser is handling cache.&lt;br&gt;
  - Fixed an issue on SNMPv3 functionality.&lt;br&gt;
  - Fixed issues related to sorting on Overview- and Log page.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">S2216 1.2.2</guid>
      <pubDate>Thu, 07 Mar 2024 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS S2224, version 1.2.2</title>
      <link>https://www.axis.com/support/firmware#85188dd0e5a35cab48b5ed28486b909e</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
Changes made in 1.2.2&lt;br&gt;
=========================&lt;br&gt;
* New functionality&lt;br&gt;
  - HTTPS connection enabled by default&lt;br&gt;
  - Added possibility to redirect from HTTP to HTTPS connection&lt;br&gt;
&lt;br&gt;
* Improved security&lt;br&gt;
  - Support for TLS 1.3.&lt;br&gt;
  - Unable to login via HTTP after disabling HTTPS.&lt;br&gt;
  - Upgraded 3rd party libraries.&lt;br&gt;
&lt;br&gt;
* Other &lt;br&gt;
  - Support for new internal hardware.&lt;br&gt;
  - Look for and detect other DHCP servers only when the DHCP server is enabled.&lt;br&gt;
  - Limit the amount of log entries that can be exported to 3000.&lt;br&gt;
  - Adjust the configurable date-time to 1980 ~ 2099.&lt;br&gt;
  - Improved user interface and error handling on date and time settings.&lt;br&gt;
  - Improved handling of invalid firmware files in the firmware upgrade process.&lt;br&gt;
  - Keep use of the uploaded SSL certificate after firmware upgrade.&lt;br&gt;
&lt;br&gt;
* Bug fixes&lt;br&gt;
  - Solved an issue where the loading bar was not visible when changing DHCP settings.&lt;br&gt;
  - Solved an issue occurring when CA bundle is uploaded.&lt;br&gt;
&lt;br&gt;
* Limitations&lt;br&gt;
  - Multiple Languages&lt;br&gt;
      Refreshing the page will show English temporary and then change to chosen one dynamically.&lt;br&gt;
  - Configurations&lt;br&gt;
      Network Settings - Management only allows to be configured as static IP.&lt;br&gt;
  - SSL Certification&lt;br&gt;
      The uploaded SSL certification will only take effect after reboot.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.2&lt;br&gt;
=========================&lt;br&gt;
* Further voltage adjustments to fix unexpected reboot of 900 MHz SoC subsystem during burning-in test. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.1&lt;br&gt;
=========================&lt;br&gt;
* Voltage adjustments to fix unexpected reboot of 900 MHz SoC subsystem during burning-in test. &lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Changes made in 1.1.0&lt;br&gt;
=========================&lt;br&gt;
* Improved performance &lt;br&gt;
  - Significant reduced switch boot time. &lt;br&gt;
  - Improved user experience and responsiveness in Overview and Power Management pages. &lt;br&gt;
&lt;br&gt;
* New functionality&lt;br&gt;
  - Web interface auto re-fresh&lt;br&gt;
  - Multi-language support and translations&lt;br&gt;
      French, Italian, German, Spanish, Russian, Japanese&lt;br&gt;
  - Power Management   Actual consumption policy&lt;br&gt;
  - Built in Help functionality&lt;br&gt;
&lt;br&gt;
* Improved security&lt;br&gt;
  - Add cookie option &#xE2;&#x80;&#x9C;Secure&#xE2;&#x80;&#x9D;, to enhance the security of token cookies when user visit web UI via https.&lt;br&gt;
  - Enhance the security rating of TLS1.2 support of web service.&lt;br&gt;
&lt;br&gt;
* Other&lt;br&gt;
  - Add popup menu which provides logout and language options.&lt;br&gt;
  - Dynamically adjust inner width setting for 4K display.&lt;br&gt;
  - Pagination of log page&lt;br&gt;
  - Able to restore backed up settings from version 1.0.0 for the same model.&lt;br&gt;
  - Some UI adjustment to handle translations correctly&lt;br&gt;
&lt;br&gt;
* Bug fixes&lt;br&gt;
  - Fixed an issue where LLDP-Med devices weren&#xE2;&#x80;&#x99;t properly handled.&lt;br&gt;
  - Fixed an issue where some devices randomly got no hardware model and name.&lt;br&gt;
  - Fixed an issue where occasional no data communication occurred on some ports.&lt;br&gt;
  - Improved web UI scalability on resolutions greater than 1080p.&lt;br&gt;
  - Fixed missing page layout borders on Settings/Maintenance and Logs. &lt;br&gt;
  - Fixed an issue with how Edge browser is handling cache.&lt;br&gt;
  - Fixed an issue on SNMPv3 functionality.&lt;br&gt;
  - Fixed issues related to sorting on Overview- and Log page.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">S2224 1.2.2</guid>
      <pubDate>Thu, 07 Mar 2024 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3915-R, version 6.50.5.17</title>
      <link>https://www.axis.com/support/firmware#0a6c455aac3ac556f439358a3c4010a7</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.17 since 6.50.5.16&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.17:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.17:C02&lt;br&gt;
Updated curl to version 8.6.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.17:C03&lt;br&gt;
Updated OpenSSL to version 1.1.1x to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3915-R 6.50.5.17</guid>
      <pubDate>Fri, 01 Mar 2024 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS M3027, version 6.50.5.16</title>
      <link>https://www.axis.com/support/firmware#7f0e9ced1f8bdbba79d28e6f807c6bde</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.16 since 6.50.5.15&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.16:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.16:C02&lt;br&gt;
Updated Apache to version 2.4.58 to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.16:C03&lt;br&gt;
Netd Service now preserves the static resolver configuration even after a soft restore,&lt;br&gt;
safeguarding static DNS/Search domain settings.&lt;br&gt;
&lt;br&gt;
6.50.5.16:C04&lt;br&gt;
Addressed CVE-2024-0054. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M3027 6.50.5.16</guid>
      <pubDate>Wed, 10 Jan 2024 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q7404, version 5.51.7.7</title>
      <link>https://www.axis.com/support/firmware#80e4b7ac62275ebf98913c18cec8b6e5</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 5.51.7.7 since 5.51.7.6&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
5.51.7.7:C01&lt;br&gt;
Addressed CVE-2023-5677. For more information, please visit the Axis vulnerability&lt;br&gt;
management portal.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q7404 5.51.7.7</guid>
      <pubDate>Mon, 27 Nov 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS A1001, version 1.65.6</title>
      <link>https://www.axis.com/support/firmware#e02c8467b3b451428fa49178d102d0ae</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
New features in 1.65.6&lt;br&gt;
======================&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 1.65.6&lt;br&gt;
=====================&lt;br&gt;
1.65.6:C1&lt;br&gt;
Fixed stability issues and optimized memory usage.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">A1001 1.65.6</guid>
      <pubDate>Wed, 22 Nov 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P7701, version 5.07.8</title>
      <link>https://www.axis.com/support/firmware#1a714783945cf2c6680a290f40b7ecfa</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
RELEASE 5.07.8&lt;br&gt;
==============&lt;br&gt;
Corrected CVE-2021-43523&lt;br&gt;
&lt;br&gt;
RELEASE 5.07.7&lt;br&gt;
==============&lt;br&gt;
Updated libupnp to version 1.6.22&lt;br&gt;
&lt;br&gt;
RELEASE 5.07.6&lt;br&gt;
==============&lt;br&gt;
&lt;br&gt;
5.07.6 is a production service release for AXIS P7701. This service release&lt;br&gt;
removes the root user&#x27;s default password in factory defaulted firmware.&lt;br&gt;
&lt;br&gt;
The password of the root user must be set first in order to initialize VAPIX&lt;br&gt;
and ONVIF interfaces to allow further configuration.&lt;br&gt;
&lt;br&gt;
This change only affects products in its factory defaulted state,&lt;br&gt;
products that are already deployed in production systems are not affected by&lt;br&gt;
this update until factory defaulted.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P7701 5.07.8</guid>
      <pubDate>Thu, 07 Sep 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q6115-E, version 6.50.5.13</title>
      <link>https://www.axis.com/support/firmware#e2d01399cd02cd85e55b8bf1ca905e74</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.13 since 6.50.5.12&lt;br&gt;
=========================================&lt;br&gt;
&lt;br&gt;
6.50.5.13:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.13:C02&lt;br&gt;
Resolved an issue where the respawn daemon incorrectly managed restarts for ACAP services,&lt;br&gt;
notably in situations with multiple acaps running simultaneously.&lt;br&gt;
&lt;br&gt;
6.50.5.13:C03&lt;br&gt;
Updated OpenSSL to version 1.1.1v to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.13:C04&lt;br&gt;
Updated CURL to version 8.2.0 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6115-E 6.50.5.13</guid>
      <pubDate>Wed, 09 Aug 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P1427-E, version 6.50.5.10</title>
      <link>https://www.axis.com/support/firmware#5b1a288f07fb07cae2cd4b81ace963d4</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.10 since 6.50.5.9&lt;br&gt;
========================================&lt;br&gt;
&lt;br&gt;
6.50.5.10:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C02&lt;br&gt;
Updated Apache to version 2.4.55 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication&lt;br&gt;
requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C04&lt;br&gt;
Updated OpenSSL to version 1.1.1t to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C05&lt;br&gt;
Updated curl to version 7.88.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1427-E 6.50.5.10</guid>
      <pubDate>Mon, 03 Apr 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P1427-LE, version 6.50.5.10</title>
      <link>https://www.axis.com/support/firmware#5b1a288f07fb07cae2cd4b81ace963d4</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.10 since 6.50.5.9&lt;br&gt;
========================================&lt;br&gt;
&lt;br&gt;
6.50.5.10:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C02&lt;br&gt;
Updated Apache to version 2.4.55 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication&lt;br&gt;
requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C04&lt;br&gt;
Updated OpenSSL to version 1.1.1t to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C05&lt;br&gt;
Updated curl to version 7.88.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1427-LE 6.50.5.10</guid>
      <pubDate>Mon, 03 Apr 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS P1428-E, version 6.50.5.10</title>
      <link>https://www.axis.com/support/firmware#d03377c5a073425d5c340c5473e9a98f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.10 since 6.50.5.9&lt;br&gt;
========================================&lt;br&gt;
&lt;br&gt;
6.50.5.10:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C02&lt;br&gt;
Updated Apache to version 2.4.55 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication&lt;br&gt;
requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C04&lt;br&gt;
Updated OpenSSL to version 1.1.1t to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C05&lt;br&gt;
Updated curl to version 7.88.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1428-E 6.50.5.10</guid>
      <pubDate>Mon, 03 Apr 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q1615, version 6.50.5.10</title>
      <link>https://www.axis.com/support/firmware#998f68e0fcd902c9478827ae6f615476</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.10 since 6.50.5.9&lt;br&gt;
========================================&lt;br&gt;
&lt;br&gt;
6.50.5.10:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C02&lt;br&gt;
Updated Apache to version 2.4.55 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication&lt;br&gt;
requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C04&lt;br&gt;
Updated OpenSSL to version 1.1.1t to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C05&lt;br&gt;
Updated curl to version 7.88.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1615 6.50.5.10</guid>
      <pubDate>Mon, 03 Apr 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q1635, version 6.50.5.10</title>
      <link>https://www.axis.com/support/firmware#998f68e0fcd902c9478827ae6f615476</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.10 since 6.50.5.9&lt;br&gt;
========================================&lt;br&gt;
&lt;br&gt;
6.50.5.10:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C02&lt;br&gt;
Updated Apache to version 2.4.55 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication&lt;br&gt;
requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C04&lt;br&gt;
Updated OpenSSL to version 1.1.1t to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C05&lt;br&gt;
Updated curl to version 7.88.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1635 6.50.5.10</guid>
      <pubDate>Mon, 03 Apr 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q1635-E, version 6.50.5.10</title>
      <link>https://www.axis.com/support/firmware#998f68e0fcd902c9478827ae6f615476</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.10 since 6.50.5.9&lt;br&gt;
========================================&lt;br&gt;
&lt;br&gt;
6.50.5.10:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C02&lt;br&gt;
Updated Apache to version 2.4.55 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication&lt;br&gt;
requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C04&lt;br&gt;
Updated OpenSSL to version 1.1.1t to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C05&lt;br&gt;
Updated curl to version 7.88.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1635-E 6.50.5.10</guid>
      <pubDate>Mon, 03 Apr 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q8665-E, version 6.50.5.10</title>
      <link>https://www.axis.com/support/firmware#632fd1437bb5c3ac9c7152b56ae1b0ce</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.10 since 6.50.5.9&lt;br&gt;
========================================&lt;br&gt;
&lt;br&gt;
6.50.5.10:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C02&lt;br&gt;
Updated Apache to version 2.4.55 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication&lt;br&gt;
requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C04&lt;br&gt;
Updated OpenSSL to version 1.1.1t to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C05&lt;br&gt;
Updated curl to version 7.88.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q8665-E 6.50.5.10</guid>
      <pubDate>Mon, 03 Apr 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS Q8665-LE, version 6.50.5.10</title>
      <link>https://www.axis.com/support/firmware#632fd1437bb5c3ac9c7152b56ae1b0ce</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.10 since 6.50.5.9&lt;br&gt;
========================================&lt;br&gt;
&lt;br&gt;
6.50.5.10:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C02&lt;br&gt;
Updated Apache to version 2.4.55 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C03&lt;br&gt;
Corrected an issue affecting some O3C clients, that caused internal authentication&lt;br&gt;
requests to fail after a few days of uptime.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C04&lt;br&gt;
Updated OpenSSL to version 1.1.1t to increase the overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.10:C05&lt;br&gt;
Updated curl to version 7.88.1 to increase overall cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q8665-LE 6.50.5.10</guid>
      <pubDate>Mon, 03 Apr 2023 00:00:00 +0200</pubDate>
    </item>
    <item>
      <title>AXIS F44, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#e40c3eeeefcf272345e77dea1c7d4118</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">F44 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS M3006, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#447a6855d3f124c29ccc53a4f39317e7</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M3006 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS M3007, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#41d5cd93454c0b272be6325beb243940</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">M3007 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P1353, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#4759767d9b44842009ee6ff3be24db2a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1353 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P1354, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#4759767d9b44842009ee6ff3be24db2a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1354 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P1357, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#871700b43c17e4da317f18a104894c4d</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1357 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P1365, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#570556447023d4c34655065592e50455</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1365 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P1365-E, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#570556447023d4c34655065592e50455</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1365-E 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P1405-E, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#b9ca3a37ee3aead126e6e4d18923a0f0</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1405-E 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P1405-LE, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#b9ca3a37ee3aead126e6e4d18923a0f0</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1405-LE 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P1425-E, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#ee21b1b77b6546179a5b386409849fb9</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1425-E 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P1425-LE, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#ee21b1b77b6546179a5b386409849fb9</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P1425-LE 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3214-V, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#41edd3c2a1cbd1a0ca48014eeab9625a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3214-V 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3214-VE, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#41edd3c2a1cbd1a0ca48014eeab9625a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3214-VE 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3215-V, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#41edd3c2a1cbd1a0ca48014eeab9625a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3215-V 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3215-VE, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#41edd3c2a1cbd1a0ca48014eeab9625a</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3215-VE 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3224-LV, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#96bec96f29d9f90ae207f0bf4e1c379f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3224-LV 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3224-LVE, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#96bec96f29d9f90ae207f0bf4e1c379f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3224-LVE 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3225-LV, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#96bec96f29d9f90ae207f0bf4e1c379f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3225-LV 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3225-LVE, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#96bec96f29d9f90ae207f0bf4e1c379f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3225-LVE 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3353, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#bc9f829aae7537b6740aa591dfdea986</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3353 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3354, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#bc9f829aae7537b6740aa591dfdea986</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3354 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3363, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#3832f2913f354e63d499ca01293e0d43</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3363 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3364, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#3832f2913f354e63d499ca01293e0d43</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3364 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3364-L, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#3832f2913f354e63d499ca01293e0d43</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3364-L 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3364-LV, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#3832f2913f354e63d499ca01293e0d43</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3364-LV 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3364-LVE, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#3832f2913f354e63d499ca01293e0d43</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3364-LVE 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3364-V, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#3832f2913f354e63d499ca01293e0d43</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3364-V 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3364-VE, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#3832f2913f354e63d499ca01293e0d43</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3364-VE 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3365, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#52cbf4d32a79448de1bac3c18afe42f6</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3365 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3384-V, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#f682cfa7816162012704f79ab16c0be8</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3384-V 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P3384-VE, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#f682cfa7816162012704f79ab16c0be8</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P3384-VE 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P5624-E, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#abb1c41adc9a4c9949f83415de0eb0cc</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P5624-E 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS P5635-E, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#b487829cbca8b09978e13ec1f378e72f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">P5635-E 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q1604, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#2daac948c2a4a6e206d2aeafca01cbf4</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1604 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q1614, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#c33b603e92e1691633d938036f1d3edc</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1614 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q1931-E, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#0668a1b199c24f0e1ce54672ce9b5882</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1931-E 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q1931-E_PT_Mount, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#062aae817c36934b8fefeaea60c29396</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1931-E_PT_Mount 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q1932-E, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#a804c93829a118cee269ec72716751a4</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1932-E 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q1932-E_PT_Mount, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#e40f0d3169c204f18e680fe99b46510b</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q1932-E_PT_Mount 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q3505, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#c8d5ab6700cbd93f9b5f0a12d2108b5c</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q3505 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6042, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#aee2a44d254afedc6a6caa37d57352e2</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6042 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6042-C, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#66d124be22707e636774be7d7309e3e5</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6042-C 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6042-E, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#c1aee59d571d841c9ad34c555d3d1d8f</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6042-E 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6042-S, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#09beee36ddacb9d21c7aa3a8d909475d</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6042-S 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6044, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#923e08664102f0023a40b749176cda75</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6044 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6044-C, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#0aed00ca1c97083894a4e775922b8353</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6044-C 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6044-E, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#7aad5114ce7cb8fc9c6119bb6a7fb97e</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6044-E 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6044-S, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#3287ebde39c0be74fa54ea05ad747190</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6044-S 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
    <item>
      <title>AXIS Q6045-C_Mk_II, version 6.50.5.8</title>
      <link>https://www.axis.com/support/firmware#d66f92215dad6a370ae42172c0ccf7c2</link>
      <description>This firmware is now available. Please visit the product's support page on www.axis.com for the download, full release notes and installation instructions.&lt;br&gt;
&lt;br&gt;
NOTE&lt;br&gt;
====================&lt;br&gt;
&lt;br&gt;
For latest information about Axis Cybersecurity, see&lt;br&gt;
https://www.axis.com/se/sv/support/product-security.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
Corrections in 6.50.5.8 since 6.50.5.7&lt;br&gt;
=======================================&lt;br&gt;
&lt;br&gt;
6.50.5.8:C01&lt;br&gt;
General improvements to the platform.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C02&lt;br&gt;
Disabled secure redirects from other network hosts net.ipv4.conf.all.secure_redirects &#x26;&lt;br&gt;
net.ipv4.conf.default.secure_redirects to increase overall minimum cybersecurity level.&lt;br&gt;
&lt;br&gt;
6.50.5.8:C03&lt;br&gt;
Corrected an issue with the audio transmit function where the response to /axis-&lt;br&gt;
cgi/audio/transmit.cgi is returning a &#x27;400 Bad Request&#x27; error.&lt;br&gt;
&lt;br&gt;
</description>
      <guid isPermaLink="false">Q6045-C_Mk_II 6.50.5.8</guid>
      <pubDate>Thu, 02 Feb 2023 00:00:00 +0100</pubDate>
    </item>
  </channel>
</rss>
