CVE-2025-10226: CWE-1395: Dependency on Vulnerable Third-Party Component in AxxonSoft AxxonOne
Dependency on Vulnerable Third-Party Component (CWE-1395) in the PostgreSQL backend in AxxonSoft Axxon One 2.0.8 and earlier on Windows and Linux allows a remote attacker to escalate privileges, execute arbitrary code, or cause denial-of-service via exploitation of multiple known CVEs present in PostgreSQL v10.x, which are resolved in PostgreSQL 17.4.
AI Analysis
Technical Summary
CVE-2025-10226 is a critical vulnerability identified in AxxonSoft's AxxonOne version 2.0.8 and earlier, which affects both Windows and Linux deployments. The root cause of this vulnerability lies in the product's dependency on an outdated and vulnerable version of the PostgreSQL database backend, specifically PostgreSQL v10.x. This version of PostgreSQL contains multiple known security flaws that have been addressed in the more recent PostgreSQL 17.4 release. The vulnerability is classified under CWE-1395, which refers to the use of vulnerable third-party components. Exploiting these underlying PostgreSQL vulnerabilities allows a remote attacker to escalate privileges, execute arbitrary code, or cause denial-of-service conditions on the affected systems without requiring any prior authentication or user interaction. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, highlighting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation over the network. Since AxxonOne is a security management platform often used for video surveillance and physical security management, exploitation could lead to severe consequences including unauthorized access to sensitive surveillance data, disruption of security operations, and potential lateral movement within an organization's network infrastructure.
Potential Impact
For European organizations, the impact of CVE-2025-10226 could be substantial. Many enterprises, government agencies, and critical infrastructure operators in Europe rely on AxxonOne for managing physical security and surveillance systems. Successful exploitation could lead to unauthorized access to surveillance feeds, manipulation or deletion of security logs, and disruption of security monitoring capabilities. This could compromise the safety of personnel and assets, violate data protection regulations such as GDPR due to unauthorized data access, and damage organizational reputation. Additionally, the ability to execute arbitrary code or cause denial-of-service could allow attackers to pivot into other parts of the network, potentially leading to broader cyber intrusions. Given the criticality of physical security in sectors like transportation, energy, and public safety, the threat posed by this vulnerability is particularly acute in Europe where regulatory compliance and security standards are stringent.
Mitigation Recommendations
To mitigate this vulnerability, European organizations using AxxonOne should urgently upgrade the PostgreSQL backend to version 17.4 or later, where the known security issues have been resolved. If an immediate upgrade is not feasible, organizations should isolate the database server from untrusted networks using network segmentation and strict firewall rules to limit exposure. Employing intrusion detection and prevention systems to monitor for suspicious activity targeting PostgreSQL services is advisable. Additionally, organizations should review and harden access controls on the AxxonOne platform and underlying database, ensuring the principle of least privilege is enforced. Regularly auditing logs for anomalous behavior and applying vendor patches for AxxonOne as they become available is critical. Finally, organizations should consider deploying application-layer firewalls or web application firewalls (WAFs) that can detect and block exploitation attempts targeting PostgreSQL vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Switzerland
CVE-2025-10226: CWE-1395: Dependency on Vulnerable Third-Party Component in AxxonSoft AxxonOne
Description
Dependency on Vulnerable Third-Party Component (CWE-1395) in the PostgreSQL backend in AxxonSoft Axxon One 2.0.8 and earlier on Windows and Linux allows a remote attacker to escalate privileges, execute arbitrary code, or cause denial-of-service via exploitation of multiple known CVEs present in PostgreSQL v10.x, which are resolved in PostgreSQL 17.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-10226 is a critical vulnerability identified in AxxonSoft's AxxonOne version 2.0.8 and earlier, which affects both Windows and Linux deployments. The root cause of this vulnerability lies in the product's dependency on an outdated and vulnerable version of the PostgreSQL database backend, specifically PostgreSQL v10.x. This version of PostgreSQL contains multiple known security flaws that have been addressed in the more recent PostgreSQL 17.4 release. The vulnerability is classified under CWE-1395, which refers to the use of vulnerable third-party components. Exploiting these underlying PostgreSQL vulnerabilities allows a remote attacker to escalate privileges, execute arbitrary code, or cause denial-of-service conditions on the affected systems without requiring any prior authentication or user interaction. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, highlighting its high impact on confidentiality, integrity, and availability, combined with ease of exploitation over the network. Since AxxonOne is a security management platform often used for video surveillance and physical security management, exploitation could lead to severe consequences including unauthorized access to sensitive surveillance data, disruption of security operations, and potential lateral movement within an organization's network infrastructure.
Potential Impact
For European organizations, the impact of CVE-2025-10226 could be substantial. Many enterprises, government agencies, and critical infrastructure operators in Europe rely on AxxonOne for managing physical security and surveillance systems. Successful exploitation could lead to unauthorized access to surveillance feeds, manipulation or deletion of security logs, and disruption of security monitoring capabilities. This could compromise the safety of personnel and assets, violate data protection regulations such as GDPR due to unauthorized data access, and damage organizational reputation. Additionally, the ability to execute arbitrary code or cause denial-of-service could allow attackers to pivot into other parts of the network, potentially leading to broader cyber intrusions. Given the criticality of physical security in sectors like transportation, energy, and public safety, the threat posed by this vulnerability is particularly acute in Europe where regulatory compliance and security standards are stringent.
Mitigation Recommendations
To mitigate this vulnerability, European organizations using AxxonOne should urgently upgrade the PostgreSQL backend to version 17.4 or later, where the known security issues have been resolved. If an immediate upgrade is not feasible, organizations should isolate the database server from untrusted networks using network segmentation and strict firewall rules to limit exposure. Employing intrusion detection and prevention systems to monitor for suspicious activity targeting PostgreSQL services is advisable. Additionally, organizations should review and harden access controls on the AxxonOne platform and underlying database, ensuring the principle of least privilege is enforced. Regularly auditing logs for anomalous behavior and applying vendor patches for AxxonOne as they become available is critical. Finally, organizations should consider deploying application-layer firewalls or web application firewalls (WAFs) that can detect and block exploitation attempts targeting PostgreSQL vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AxxonSoft
- Date Reserved
- 2025-09-10T12:37:44.975Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c17661e55cc6e90da1cfa3
Added to database: 9/10/2025, 1:00:17 PM
Last enriched: 9/10/2025, 1:15:11 PM
Last updated: 9/10/2025, 2:35:17 PM
Views: 4
Related Threats
CVE-2025-54123: CWE-20: Improper Input Validation in SpectoLabs hoverfly
CriticalCVE-2025-10209: Improper Authorization in Papermerge DMS
MediumCVE-2025-8696: CWE-789 Memory Allocation with Excessive Size Value in ISC Stork
HighCVE-2025-50892: n/a
HighCVE-2025-55976: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.