Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10222: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in AxxonSoft AxxonOne C-Werk

0
Low
VulnerabilityCVE-2025-10222cvecve-2025-10222cwe-200
Published: Wed Sep 10 2025 (09/10/2025, 12:34:50 UTC)
Source: CVE Database V5
Vendor/Project: AxxonSoft
Product: AxxonOne C-Werk

Description

Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) in the diagnostic dump component in AxxonSoft Axxon One VMS (C-Werk) 2.0.0 through 2.0.1 on Windows allows a local attacker to obtain licensing-related information such as timestamps, license states, and registry values via reading diagnostic export files created by the built-in troubleshooting tool.

AI-Powered Analysis

AILast updated: 10/08/2025, 12:15:08 UTC

Technical Analysis

CVE-2025-10222 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting AxxonSoft's AxxonOne C-Werk Video Management System (VMS) versions 2.0.0 and 2.0.1 running on Windows platforms. The issue arises from the diagnostic dump component, which creates export files for troubleshooting purposes. These diagnostic files contain sensitive licensing-related information such as timestamps, license states, and registry values. Due to insufficient access controls on these files, a local attacker with limited privileges (PR:L) can read these files and extract sensitive data without requiring user interaction (UI:N). The vulnerability has a CVSS v3.1 base score of 3.3, indicating low severity, primarily because it requires local access and only exposes information without affecting integrity or availability. No known exploits have been reported in the wild, and no patches have been linked yet. The exposure of licensing information could potentially aid an attacker in further reconnaissance or license circumvention attempts but does not directly compromise system operations or data integrity. The vulnerability highlights the need for stricter file permission management on diagnostic outputs and careful handling of sensitive information within troubleshooting tools.

Potential Impact

For European organizations, the primary impact of CVE-2025-10222 is the unauthorized disclosure of licensing information related to the AxxonOne C-Werk VMS. While this does not directly affect system integrity or availability, exposure of licensing states and timestamps could facilitate further targeted attacks, such as license tampering or unauthorized software use. Organizations with local user threat models—such as those with many employees, contractors, or visitors who have physical or remote local access—are at higher risk. This could be particularly relevant in sectors like critical infrastructure, transportation, or public safety where video management systems are widely deployed. The information leakage could also aid attackers in crafting more effective social engineering or privilege escalation attempts. However, since exploitation requires local access and no remote exploitation vector is known, the overall risk remains limited to insider threats or attackers who have already gained some foothold within the network.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict access controls on diagnostic export files generated by the AxxonOne C-Werk VMS. This includes setting file system permissions to restrict read access only to trusted administrators and system processes. Monitoring and auditing local user activity around the creation and access of diagnostic files can help detect unauthorized attempts to read sensitive information. Organizations should also consider disabling or limiting the use of the built-in troubleshooting tool on production systems if not required. Applying the principle of least privilege to local user accounts reduces the risk of exploitation. Since no patches are currently linked, organizations should engage with AxxonSoft for updates or advisories. Additionally, network segmentation and endpoint protection can help prevent attackers from gaining local access in the first place. Finally, educating staff about the risks of local information disclosure and enforcing strong physical and logical access controls will further reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AxxonSoft
Date Reserved
2025-09-10T12:33:59.159Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c172f9e55cc6e90da1b4c5

Added to database: 9/10/2025, 12:45:45 PM

Last enriched: 10/8/2025, 12:15:08 PM

Last updated: 10/30/2025, 2:15:13 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats