Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10223: CWE-613 Insufficient Session Expiration in AxxonSoft AxxonOne C-Werk

0
Medium
VulnerabilityCVE-2025-10223cvecve-2025-10223cwe-613
Published: Wed Sep 10 2025 (09/10/2025, 12:35:32 UTC)
Source: CVE Database V5
Vendor/Project: AxxonSoft
Product: AxxonOne C-Werk

Description

Insufficient Session Expiration (CWE-613) in the Web Admin Panel in AxxonSoft Axxon One (C-Werk) prior to 2.0.3 on Windows allows a local or remote authenticated attacker to retain access with removed privileges via continued use of an unexpired session token until natural expiration.

AI-Powered Analysis

AILast updated: 10/08/2025, 12:15:20 UTC

Technical Analysis

CVE-2025-10223 addresses a vulnerability categorized under CWE-613 (Insufficient Session Expiration) found in the Web Admin Panel of AxxonSoft's AxxonOne C-Werk software versions prior to 2.0.3 on Windows platforms. The issue arises because session tokens remain valid even after the associated user's privileges have been revoked or removed, allowing an attacker who has already authenticated to continue accessing the system with the previous level of access until the session token naturally expires. This flaw can be exploited by both local and remote authenticated attackers without requiring additional user interaction, making it easier to maintain unauthorized access. The vulnerability affects confidentiality and integrity by enabling attackers to perform actions beyond their current privileges, potentially accessing sensitive video surveillance data or altering system configurations. The CVSS v3.1 score is 5.4 (medium), reflecting a network attack vector with low complexity, requiring privileges but no user interaction, and impacting confidentiality and integrity but not availability. No patches or exploit code were listed at the time of publication, and no known exploits in the wild have been reported. The vulnerability highlights the importance of proper session management, especially in security-critical applications like video surveillance management systems.

Potential Impact

For European organizations, especially those in sectors such as critical infrastructure, public safety, transportation, and large enterprises relying on AxxonOne C-Werk for video surveillance and security management, this vulnerability poses a risk of unauthorized prolonged access. Attackers who gain initial authenticated access—potentially through compromised credentials or insider threats—can retain access even after their privileges are revoked, undermining access control policies. This can lead to unauthorized viewing or manipulation of surveillance feeds, tampering with security configurations, or data leakage. The impact on confidentiality and integrity can have regulatory and operational consequences, including violations of GDPR if personal data is exposed. The lack of availability impact reduces the risk of service disruption but does not diminish the threat to data security and trust. Organizations with complex user role management and frequent privilege changes are particularly vulnerable to this issue.

Mitigation Recommendations

To mitigate CVE-2025-10223, organizations should promptly upgrade AxxonOne C-Werk to version 2.0.3 or later where the session expiration issue is addressed. In addition, administrators should implement strict session management policies, including reducing session timeout durations and enforcing session invalidation immediately upon privilege changes or user logout. Monitoring and logging of session activities should be enhanced to detect anomalous prolonged sessions. Employing multi-factor authentication (MFA) can reduce the risk of initial unauthorized access. Network segmentation and limiting administrative access to trusted hosts can further reduce exposure. Regular audits of user privileges and session states will help identify and remediate lingering sessions. If immediate patching is not feasible, consider disabling remote administrative access or restricting it via VPN and IP whitelisting until the update is applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AxxonSoft
Date Reserved
2025-09-10T12:35:13.351Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c172f9e55cc6e90da1b4c8

Added to database: 9/10/2025, 12:45:45 PM

Last enriched: 10/8/2025, 12:15:20 PM

Last updated: 10/30/2025, 2:17:32 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats