CVE-2025-10226: CWE-1395: Dependency on Vulnerable Third-Party Component in AxxonSoft AxxonOne C-Werk
Dependency on Vulnerable Third-Party Component (CWE-1395) in the PostgreSQL backend in AxxonSoft Axxon One (C-Werk) 2.0.8 and earlier on Windows and Linux allows a remote attacker to escalate privileges, execute arbitrary code, or cause denial-of-service via exploitation of multiple known CVEs present in PostgreSQL v10.x, which are resolved in PostgreSQL 17.4.
AI Analysis
Technical Summary
CVE-2025-10226 identifies a critical security vulnerability in the AxxonSoft AxxonOne C-Werk 2.0.8 and earlier versions, which rely on PostgreSQL version 10.x as their backend database. This version of PostgreSQL contains multiple known vulnerabilities that have been addressed in PostgreSQL 17.4. The vulnerability is classified under CWE-1395, which refers to the dependency on vulnerable third-party components. Exploiting these PostgreSQL vulnerabilities allows a remote attacker to perform privilege escalation, execute arbitrary code, or cause denial-of-service conditions on affected systems. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly exploitable. The scope of impact is unchanged (S:U), but the consequences affect confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The lack of authentication requirements and the critical nature of the backend database elevate the risk. Although no active exploits have been reported, the presence of multiple known CVEs in the PostgreSQL version used by AxxonOne C-Werk makes this a significant threat. The vulnerability underscores the risks associated with third-party software dependencies and the importance of timely patching and component updates.
Potential Impact
For European organizations, especially those in sectors relying on AxxonSoft AxxonOne C-Werk for security and surveillance operations, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized access to sensitive video surveillance data, manipulation or deletion of critical logs, and disruption of security monitoring services. This could compromise physical security, data privacy, and operational continuity. The ability to execute arbitrary code remotely without authentication means attackers could establish persistent footholds within networks, potentially moving laterally to other critical systems. Denial-of-service conditions could incapacitate surveillance systems during critical events, increasing organizational risk. Given the critical infrastructure and public safety applications of such systems in Europe, the impact extends beyond individual organizations to national security and public safety. Additionally, regulatory compliance risks arise if personal data processed by these systems is exposed or manipulated, potentially violating GDPR requirements.
Mitigation Recommendations
European organizations should immediately assess their deployment of AxxonSoft AxxonOne C-Werk and identify systems running versions 2.0.8 or earlier. The primary mitigation is to upgrade the PostgreSQL backend to version 17.4 or later, which contains patches for all known vulnerabilities exploited in this CVE. If immediate upgrade is not feasible, organizations should isolate affected systems within segmented network zones with strict access controls to limit exposure. Implement network-level firewall rules to restrict inbound and outbound traffic to trusted sources only. Continuous monitoring for unusual PostgreSQL activity, such as unexpected connections or commands, should be established using IDS/IPS solutions and log analysis. Employ application-layer firewalls or database activity monitoring tools to detect and block exploitation attempts. Regularly review and update third-party component inventories to prevent similar risks. Finally, coordinate with AxxonSoft for official patches or guidance and ensure all security advisories are promptly applied.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-10226: CWE-1395: Dependency on Vulnerable Third-Party Component in AxxonSoft AxxonOne C-Werk
Description
Dependency on Vulnerable Third-Party Component (CWE-1395) in the PostgreSQL backend in AxxonSoft Axxon One (C-Werk) 2.0.8 and earlier on Windows and Linux allows a remote attacker to escalate privileges, execute arbitrary code, or cause denial-of-service via exploitation of multiple known CVEs present in PostgreSQL v10.x, which are resolved in PostgreSQL 17.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-10226 identifies a critical security vulnerability in the AxxonSoft AxxonOne C-Werk 2.0.8 and earlier versions, which rely on PostgreSQL version 10.x as their backend database. This version of PostgreSQL contains multiple known vulnerabilities that have been addressed in PostgreSQL 17.4. The vulnerability is classified under CWE-1395, which refers to the dependency on vulnerable third-party components. Exploiting these PostgreSQL vulnerabilities allows a remote attacker to perform privilege escalation, execute arbitrary code, or cause denial-of-service conditions on affected systems. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly exploitable. The scope of impact is unchanged (S:U), but the consequences affect confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The lack of authentication requirements and the critical nature of the backend database elevate the risk. Although no active exploits have been reported, the presence of multiple known CVEs in the PostgreSQL version used by AxxonOne C-Werk makes this a significant threat. The vulnerability underscores the risks associated with third-party software dependencies and the importance of timely patching and component updates.
Potential Impact
For European organizations, especially those in sectors relying on AxxonSoft AxxonOne C-Werk for security and surveillance operations, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized access to sensitive video surveillance data, manipulation or deletion of critical logs, and disruption of security monitoring services. This could compromise physical security, data privacy, and operational continuity. The ability to execute arbitrary code remotely without authentication means attackers could establish persistent footholds within networks, potentially moving laterally to other critical systems. Denial-of-service conditions could incapacitate surveillance systems during critical events, increasing organizational risk. Given the critical infrastructure and public safety applications of such systems in Europe, the impact extends beyond individual organizations to national security and public safety. Additionally, regulatory compliance risks arise if personal data processed by these systems is exposed or manipulated, potentially violating GDPR requirements.
Mitigation Recommendations
European organizations should immediately assess their deployment of AxxonSoft AxxonOne C-Werk and identify systems running versions 2.0.8 or earlier. The primary mitigation is to upgrade the PostgreSQL backend to version 17.4 or later, which contains patches for all known vulnerabilities exploited in this CVE. If immediate upgrade is not feasible, organizations should isolate affected systems within segmented network zones with strict access controls to limit exposure. Implement network-level firewall rules to restrict inbound and outbound traffic to trusted sources only. Continuous monitoring for unusual PostgreSQL activity, such as unexpected connections or commands, should be established using IDS/IPS solutions and log analysis. Employ application-layer firewalls or database activity monitoring tools to detect and block exploitation attempts. Regularly review and update third-party component inventories to prevent similar risks. Finally, coordinate with AxxonSoft for official patches or guidance and ensure all security advisories are promptly applied.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AxxonSoft
- Date Reserved
- 2025-09-10T12:37:44.975Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c17661e55cc6e90da1cfa3
Added to database: 9/10/2025, 1:00:17 PM
Last enriched: 10/8/2025, 12:14:53 PM
Last updated: 10/27/2025, 1:26:28 AM
Views: 111
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12200: NULL Pointer Dereference in dnsmasq
MediumCVE-2025-12199: NULL Pointer Dereference in dnsmasq
MediumCVE-2025-12198: Heap-based Buffer Overflow in dnsmasq
HighCVE-2025-12278: CWE-20 Improper Input Validation in Azure Access Technology BLU-IC2
MediumCVE-2025-12275: CWE-20 Improper Input Validation in Azure Access Technology BLU-IC2
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.