CVE-2025-10224: CWE-287: Improper Authentication in AxxonSoft AxxonOne C-Werk
Improper Authentication (CWE-287) in the LDAP authentication engine in AxxonSoft Axxon One (C-Werk) 2.0.2 and earlier on Windows allows a remote authenticated user to be denied access or misassigned roles via incorrect evaluation of nested LDAP group memberships during login.
AI Analysis
Technical Summary
CVE-2025-10224 is an improper authentication vulnerability classified under CWE-287 affecting AxxonSoft's AxxonOne C-Werk software, specifically versions 2.0.2 and earlier on Windows platforms. The issue arises from the LDAP authentication engine's incorrect handling of nested LDAP group memberships during user login. LDAP (Lightweight Directory Access Protocol) is commonly used for centralized authentication and authorization. In this case, the software fails to properly evaluate nested group memberships, which can lead to two main problems: legitimate users may be denied access erroneously, or users may be assigned incorrect roles, potentially granting them unauthorized privileges. The vulnerability requires the attacker to be a remote authenticated user with valid credentials, meaning it is not exploitable by unauthenticated attackers. The CVSS v3.1 score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and impacts on integrity and availability but not confidentiality. Although no known exploits are currently reported, the flaw could disrupt security operations or allow privilege escalation within affected environments. The absence of published patches necessitates interim mitigations. Organizations relying on AxxonOne C-Werk for security management should audit their LDAP configurations, especially nested group structures, and monitor for unexpected authentication failures or role changes. This vulnerability highlights the importance of robust authentication logic in security-critical applications.
Potential Impact
For European organizations, the impact of CVE-2025-10224 can be significant in environments where AxxonOne C-Werk is deployed for video surveillance, access control, or security event management. Misassignment of roles could lead to unauthorized access to sensitive security functions or denial of service to legitimate users, potentially disrupting physical security operations. This can affect critical infrastructure sectors such as transportation, energy, government facilities, and large enterprises that depend on accurate role-based access controls. While confidentiality is not directly impacted, integrity and availability of security management systems are at risk, which could indirectly lead to broader security incidents. The requirement for valid credentials limits the attack surface but insider threats or compromised accounts could exploit this vulnerability. European organizations must consider the regulatory implications under GDPR if security controls are weakened, potentially leading to data protection violations. The medium severity rating suggests a moderate but non-negligible risk that warrants prompt attention.
Mitigation Recommendations
Since no patches are currently available, European organizations should implement specific mitigations: 1) Conduct a thorough audit of LDAP group configurations, focusing on nested groups to identify and correct any misconfigurations that could trigger improper role assignments. 2) Limit the number of users with elevated privileges and enforce the principle of least privilege to reduce potential damage from misassigned roles. 3) Implement enhanced monitoring and alerting on authentication events, especially failed logins or unexpected role changes, to detect exploitation attempts early. 4) Use network segmentation and access controls to restrict access to the AxxonOne C-Werk management interfaces to trusted hosts and users only. 5) Prepare incident response plans specifically addressing potential misuse of authentication and authorization mechanisms. 6) Engage with AxxonSoft for timely updates and patches and plan for rapid deployment once available. 7) Consider multi-factor authentication integration if supported to add an additional layer of security beyond LDAP credentials.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Switzerland
CVE-2025-10224: CWE-287: Improper Authentication in AxxonSoft AxxonOne C-Werk
Description
Improper Authentication (CWE-287) in the LDAP authentication engine in AxxonSoft Axxon One (C-Werk) 2.0.2 and earlier on Windows allows a remote authenticated user to be denied access or misassigned roles via incorrect evaluation of nested LDAP group memberships during login.
AI-Powered Analysis
Technical Analysis
CVE-2025-10224 is an improper authentication vulnerability classified under CWE-287 affecting AxxonSoft's AxxonOne C-Werk software, specifically versions 2.0.2 and earlier on Windows platforms. The issue arises from the LDAP authentication engine's incorrect handling of nested LDAP group memberships during user login. LDAP (Lightweight Directory Access Protocol) is commonly used for centralized authentication and authorization. In this case, the software fails to properly evaluate nested group memberships, which can lead to two main problems: legitimate users may be denied access erroneously, or users may be assigned incorrect roles, potentially granting them unauthorized privileges. The vulnerability requires the attacker to be a remote authenticated user with valid credentials, meaning it is not exploitable by unauthenticated attackers. The CVSS v3.1 score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and impacts on integrity and availability but not confidentiality. Although no known exploits are currently reported, the flaw could disrupt security operations or allow privilege escalation within affected environments. The absence of published patches necessitates interim mitigations. Organizations relying on AxxonOne C-Werk for security management should audit their LDAP configurations, especially nested group structures, and monitor for unexpected authentication failures or role changes. This vulnerability highlights the importance of robust authentication logic in security-critical applications.
Potential Impact
For European organizations, the impact of CVE-2025-10224 can be significant in environments where AxxonOne C-Werk is deployed for video surveillance, access control, or security event management. Misassignment of roles could lead to unauthorized access to sensitive security functions or denial of service to legitimate users, potentially disrupting physical security operations. This can affect critical infrastructure sectors such as transportation, energy, government facilities, and large enterprises that depend on accurate role-based access controls. While confidentiality is not directly impacted, integrity and availability of security management systems are at risk, which could indirectly lead to broader security incidents. The requirement for valid credentials limits the attack surface but insider threats or compromised accounts could exploit this vulnerability. European organizations must consider the regulatory implications under GDPR if security controls are weakened, potentially leading to data protection violations. The medium severity rating suggests a moderate but non-negligible risk that warrants prompt attention.
Mitigation Recommendations
Since no patches are currently available, European organizations should implement specific mitigations: 1) Conduct a thorough audit of LDAP group configurations, focusing on nested groups to identify and correct any misconfigurations that could trigger improper role assignments. 2) Limit the number of users with elevated privileges and enforce the principle of least privilege to reduce potential damage from misassigned roles. 3) Implement enhanced monitoring and alerting on authentication events, especially failed logins or unexpected role changes, to detect exploitation attempts early. 4) Use network segmentation and access controls to restrict access to the AxxonOne C-Werk management interfaces to trusted hosts and users only. 5) Prepare incident response plans specifically addressing potential misuse of authentication and authorization mechanisms. 6) Engage with AxxonSoft for timely updates and patches and plan for rapid deployment once available. 7) Consider multi-factor authentication integration if supported to add an additional layer of security beyond LDAP credentials.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AxxonSoft
- Date Reserved
- 2025-09-10T12:35:55.091Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c17661e55cc6e90da1cf9d
Added to database: 9/10/2025, 1:00:17 PM
Last enriched: 10/8/2025, 12:15:34 PM
Last updated: 10/29/2025, 9:37:16 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12450: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litespeedtech LiteSpeed Cache
MediumCVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.