Skip to main content

CVE-2025-10225: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in AxxonSoft AxxonOne

High
VulnerabilityCVE-2025-10225cvecve-2025-10225cwe-119
Published: Wed Sep 10 2025 (09/10/2025, 12:37:15 UTC)
Source: CVE Database V5
Vendor/Project: AxxonSoft
Product: AxxonOne

Description

Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) in the OpenSSL-based session module in AxxonSoft Axxon One 2.0.6 and earlier on Windows allows a remote attacker under high load conditions to cause application crashes or unpredictable behavior via triggering memory reallocation errors when handling expired session keys.

AI-Powered Analysis

AILast updated: 09/10/2025, 13:15:20 UTC

Technical Analysis

CVE-2025-10225 is a high-severity vulnerability classified under CWE-119, which pertains to improper restriction of operations within the bounds of a memory buffer. This vulnerability affects AxxonSoft's AxxonOne video management software, specifically version 2.0.6 and earlier running on Windows platforms. The flaw resides in the OpenSSL-based session module, where under conditions of high load, the application improperly handles memory reallocation errors when processing expired session keys. This mishandling can lead to application crashes or unpredictable behavior, such as memory corruption or instability. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Although it does not impact confidentiality or integrity directly, it severely affects availability by enabling denial-of-service (DoS) conditions. The root cause is a failure to properly restrict operations within allocated memory bounds during session key expiration handling, leading to buffer mismanagement. No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that organizations using affected versions remain vulnerable until remediation is available.

Potential Impact

For European organizations deploying AxxonOne 2.0.6 or earlier, this vulnerability poses a significant risk to the availability of their video surveillance and security monitoring infrastructure. AxxonOne is widely used in critical sectors such as transportation, public safety, retail, and industrial facilities across Europe. An attacker could remotely trigger application crashes under high load, potentially causing denial-of-service conditions that disrupt security operations and monitoring capabilities. This could lead to gaps in surveillance coverage, delayed incident response, and increased exposure to physical security threats. Additionally, unpredictable application behavior might complicate forensic investigations or system stability. Given the remote, unauthenticated exploit vector, attackers could leverage this vulnerability from external networks, increasing the threat surface. The lack of impact on confidentiality and integrity limits data breach risks, but the operational disruption alone is critical for security-sensitive environments.

Mitigation Recommendations

Organizations should prioritize upgrading AxxonOne to a version that addresses this vulnerability once a patch is released by AxxonSoft. Until then, practical mitigations include: 1) Implementing network-level protections such as firewall rules and intrusion prevention systems to restrict access to AxxonOne management interfaces and session modules from untrusted or external networks. 2) Monitoring system logs and application behavior for signs of crashes or instability indicative of exploitation attempts. 3) Limiting high load conditions on the session module by optimizing session key expiration policies and load balancing to reduce the likelihood of triggering the vulnerability. 4) Employing application whitelisting and endpoint protection to detect anomalous activity related to memory corruption. 5) Coordinating with AxxonSoft support for early access to patches or workarounds and applying them promptly. 6) Conducting regular backups and ensuring rapid recovery procedures to minimize downtime in case of successful exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AxxonSoft
Date Reserved
2025-09-10T12:37:02.143Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c17661e55cc6e90da1cfa0

Added to database: 9/10/2025, 1:00:17 PM

Last enriched: 9/10/2025, 1:15:20 PM

Last updated: 9/10/2025, 7:52:52 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats