Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10224: CWE-287: Improper Authentication in AxxonSoft AxxonOne C-Werk

0
Medium
VulnerabilityCVE-2025-10224cvecve-2025-10224cwe-287
Published: Wed Sep 10 2025 (09/10/2025, 12:36:22 UTC)
Source: CVE Database V5
Vendor/Project: AxxonSoft
Product: AxxonOne C-Werk

Description

Improper Authentication (CWE-287) in the LDAP authentication engine in AxxonSoft Axxon One (C-Werk) 2.0.2 and earlier on Windows allows a remote authenticated user to be denied access or misassigned roles via incorrect evaluation of nested LDAP group memberships during login.

AI-Powered Analysis

AILast updated: 10/08/2025, 12:15:34 UTC

Technical Analysis

CVE-2025-10224 is an improper authentication vulnerability classified under CWE-287 affecting AxxonSoft's AxxonOne C-Werk software, specifically versions 2.0.2 and earlier on Windows platforms. The issue arises from the LDAP authentication engine's incorrect handling of nested LDAP group memberships during user login. LDAP (Lightweight Directory Access Protocol) is commonly used for centralized authentication and authorization. In this case, the software fails to properly evaluate nested group memberships, which can lead to two main problems: legitimate users may be denied access erroneously, or users may be assigned incorrect roles, potentially granting them unauthorized privileges. The vulnerability requires the attacker to be a remote authenticated user with valid credentials, meaning it is not exploitable by unauthenticated attackers. The CVSS v3.1 score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and impacts on integrity and availability but not confidentiality. Although no known exploits are currently reported, the flaw could disrupt security operations or allow privilege escalation within affected environments. The absence of published patches necessitates interim mitigations. Organizations relying on AxxonOne C-Werk for security management should audit their LDAP configurations, especially nested group structures, and monitor for unexpected authentication failures or role changes. This vulnerability highlights the importance of robust authentication logic in security-critical applications.

Potential Impact

For European organizations, the impact of CVE-2025-10224 can be significant in environments where AxxonOne C-Werk is deployed for video surveillance, access control, or security event management. Misassignment of roles could lead to unauthorized access to sensitive security functions or denial of service to legitimate users, potentially disrupting physical security operations. This can affect critical infrastructure sectors such as transportation, energy, government facilities, and large enterprises that depend on accurate role-based access controls. While confidentiality is not directly impacted, integrity and availability of security management systems are at risk, which could indirectly lead to broader security incidents. The requirement for valid credentials limits the attack surface but insider threats or compromised accounts could exploit this vulnerability. European organizations must consider the regulatory implications under GDPR if security controls are weakened, potentially leading to data protection violations. The medium severity rating suggests a moderate but non-negligible risk that warrants prompt attention.

Mitigation Recommendations

Since no patches are currently available, European organizations should implement specific mitigations: 1) Conduct a thorough audit of LDAP group configurations, focusing on nested groups to identify and correct any misconfigurations that could trigger improper role assignments. 2) Limit the number of users with elevated privileges and enforce the principle of least privilege to reduce potential damage from misassigned roles. 3) Implement enhanced monitoring and alerting on authentication events, especially failed logins or unexpected role changes, to detect exploitation attempts early. 4) Use network segmentation and access controls to restrict access to the AxxonOne C-Werk management interfaces to trusted hosts and users only. 5) Prepare incident response plans specifically addressing potential misuse of authentication and authorization mechanisms. 6) Engage with AxxonSoft for timely updates and patches and plan for rapid deployment once available. 7) Consider multi-factor authentication integration if supported to add an additional layer of security beyond LDAP credentials.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AxxonSoft
Date Reserved
2025-09-10T12:35:55.091Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c17661e55cc6e90da1cf9d

Added to database: 9/10/2025, 1:00:17 PM

Last enriched: 10/8/2025, 12:15:34 PM

Last updated: 10/29/2025, 9:37:16 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats