CVE-2025-10220: CWE-1104: Use of Unmaintained Third Party Components in AxxonSoft AxxonOne C-Werk
Use of Unmaintained Third Party Components (CWE-1104) in the NuGet dependency components in AxxonSoft Axxon One VMS 2.0.0 through 2.0.4 on Windows allows a remote attacker to execute arbitrary code or bypass security features via exploitation of vulnerable third-party packages such as Google.Protobuf, DynamicData, System.Runtime.CompilerServices.Unsafe, and others.
AI Analysis
Technical Summary
CVE-2025-10220 is a critical security vulnerability identified in AxxonSoft's AxxonOne C-Werk Video Management System (VMS) versions 2.0.0 through 2.0.4 on Windows platforms. The root cause is the use of unmaintained and vulnerable third-party NuGet components, including Google.Protobuf, DynamicData, and System.Runtime.CompilerServices.Unsafe. These components contain known security flaws that have not been patched or updated, leading to a CWE-1104 classification (Use of Unmaintained Third Party Components). This vulnerability allows a remote attacker to execute arbitrary code or bypass security mechanisms without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, potentially enabling full system compromise. The vulnerability is exploitable over the network with low attack complexity. Although no exploits have been observed in the wild yet, the critical CVSS score of 9.8 underscores the urgency for remediation. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through dependency management and network controls. Given the role of AxxonOne C-Werk in video surveillance and security operations, exploitation could severely disrupt security monitoring and incident response capabilities.
Potential Impact
For European organizations, the impact of CVE-2025-10220 is substantial. AxxonOne C-Werk is used in various sectors including public safety, transportation, critical infrastructure, and corporate security. Successful exploitation could lead to unauthorized access to video feeds, manipulation or deletion of surveillance data, and disruption of security operations. This compromises physical security and can facilitate further attacks such as espionage, sabotage, or unauthorized facility access. The integrity and availability of video management systems are critical for real-time monitoring and forensic investigations; thus, their compromise could delay incident detection and response. European entities relying on these systems for regulatory compliance and safety monitoring face legal and reputational risks. The vulnerability’s network-exploitable nature increases the attack surface, especially in interconnected environments. The absence of authentication requirements means attackers can exploit this remotely, potentially from outside organizational networks, increasing the threat to European organizations.
Mitigation Recommendations
1. Immediate inventory and assessment of AxxonOne C-Werk deployments to identify affected versions (2.0.0 through 2.0.4). 2. Engage with AxxonSoft for official patches or updates; prioritize applying them as soon as they become available. 3. Conduct a thorough review and update of all third-party NuGet dependencies used within the VMS environment to ensure they are maintained and patched. 4. Implement network segmentation to isolate VMS servers from general user networks and restrict access to trusted management hosts only. 5. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous activity related to known vulnerable components. 6. Monitor network traffic for unusual connections or data exfiltration attempts involving VMS servers. 7. Enforce strict access controls and multi-factor authentication on management interfaces to reduce lateral movement risk. 8. Regularly back up VMS configurations and video data to enable recovery in case of compromise. 9. Conduct security awareness training for administrators on the risks of unmaintained dependencies and supply chain vulnerabilities. 10. Consider alternative VMS solutions with better security track records if patching is delayed or unsupported.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-10220: CWE-1104: Use of Unmaintained Third Party Components in AxxonSoft AxxonOne C-Werk
Description
Use of Unmaintained Third Party Components (CWE-1104) in the NuGet dependency components in AxxonSoft Axxon One VMS 2.0.0 through 2.0.4 on Windows allows a remote attacker to execute arbitrary code or bypass security features via exploitation of vulnerable third-party packages such as Google.Protobuf, DynamicData, System.Runtime.CompilerServices.Unsafe, and others.
AI-Powered Analysis
Technical Analysis
CVE-2025-10220 is a critical security vulnerability identified in AxxonSoft's AxxonOne C-Werk Video Management System (VMS) versions 2.0.0 through 2.0.4 on Windows platforms. The root cause is the use of unmaintained and vulnerable third-party NuGet components, including Google.Protobuf, DynamicData, and System.Runtime.CompilerServices.Unsafe. These components contain known security flaws that have not been patched or updated, leading to a CWE-1104 classification (Use of Unmaintained Third Party Components). This vulnerability allows a remote attacker to execute arbitrary code or bypass security mechanisms without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact spans confidentiality, integrity, and availability, potentially enabling full system compromise. The vulnerability is exploitable over the network with low attack complexity. Although no exploits have been observed in the wild yet, the critical CVSS score of 9.8 underscores the urgency for remediation. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through dependency management and network controls. Given the role of AxxonOne C-Werk in video surveillance and security operations, exploitation could severely disrupt security monitoring and incident response capabilities.
Potential Impact
For European organizations, the impact of CVE-2025-10220 is substantial. AxxonOne C-Werk is used in various sectors including public safety, transportation, critical infrastructure, and corporate security. Successful exploitation could lead to unauthorized access to video feeds, manipulation or deletion of surveillance data, and disruption of security operations. This compromises physical security and can facilitate further attacks such as espionage, sabotage, or unauthorized facility access. The integrity and availability of video management systems are critical for real-time monitoring and forensic investigations; thus, their compromise could delay incident detection and response. European entities relying on these systems for regulatory compliance and safety monitoring face legal and reputational risks. The vulnerability’s network-exploitable nature increases the attack surface, especially in interconnected environments. The absence of authentication requirements means attackers can exploit this remotely, potentially from outside organizational networks, increasing the threat to European organizations.
Mitigation Recommendations
1. Immediate inventory and assessment of AxxonOne C-Werk deployments to identify affected versions (2.0.0 through 2.0.4). 2. Engage with AxxonSoft for official patches or updates; prioritize applying them as soon as they become available. 3. Conduct a thorough review and update of all third-party NuGet dependencies used within the VMS environment to ensure they are maintained and patched. 4. Implement network segmentation to isolate VMS servers from general user networks and restrict access to trusted management hosts only. 5. Deploy intrusion detection and prevention systems (IDS/IPS) with signatures tuned to detect anomalous activity related to known vulnerable components. 6. Monitor network traffic for unusual connections or data exfiltration attempts involving VMS servers. 7. Enforce strict access controls and multi-factor authentication on management interfaces to reduce lateral movement risk. 8. Regularly back up VMS configurations and video data to enable recovery in case of compromise. 9. Conduct security awareness training for administrators on the risks of unmaintained dependencies and supply chain vulnerabilities. 10. Consider alternative VMS solutions with better security track records if patching is delayed or unsupported.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AxxonSoft
- Date Reserved
- 2025-09-10T12:28:18.184Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c172f9e55cc6e90da1b4bf
Added to database: 9/10/2025, 12:45:45 PM
Last enriched: 10/8/2025, 11:45:13 AM
Last updated: 10/30/2025, 9:50:39 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-54470: CWE-295: Improper Certificate Validation in SUSE neuvector
HighCVE-2025-62503: CWE-250: Execution with Unnecessary Privileges in Apache Software Foundation Apache Airflow
HighCVE-2025-62402: CWE-250: Execution with Unnecessary Privileges in Apache Software Foundation Apache Airflow
HighCVE-2025-11906: CWE-732 Incorrect Permission Assignment for Critical Resource in Progress Software Flowmon
MediumCVE-2025-11881: CWE-862 Missing Authorization in scottopolis AppPresser – Mobile App Framework
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.