Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10226: CWE-1395: Dependency on Vulnerable Third-Party Component in AxxonSoft AxxonOne C-Werk

0
Critical
VulnerabilityCVE-2025-10226cvecve-2025-10226cwe-1395
Published: Wed Sep 10 2025 (09/10/2025, 12:38:42 UTC)
Source: CVE Database V5
Vendor/Project: AxxonSoft
Product: AxxonOne C-Werk

Description

Dependency on Vulnerable Third-Party Component (CWE-1395) in the PostgreSQL backend in AxxonSoft Axxon One (C-Werk) 2.0.8 and earlier on Windows and Linux allows a remote attacker to escalate privileges, execute arbitrary code, or cause denial-of-service via exploitation of multiple known CVEs present in PostgreSQL v10.x, which are resolved in PostgreSQL 17.4.

AI-Powered Analysis

AILast updated: 10/08/2025, 12:14:53 UTC

Technical Analysis

CVE-2025-10226 identifies a critical security vulnerability in the AxxonSoft AxxonOne C-Werk 2.0.8 and earlier versions, which rely on PostgreSQL version 10.x as their backend database. This version of PostgreSQL contains multiple known vulnerabilities that have been addressed in PostgreSQL 17.4. The vulnerability is classified under CWE-1395, which refers to the dependency on vulnerable third-party components. Exploiting these PostgreSQL vulnerabilities allows a remote attacker to perform privilege escalation, execute arbitrary code, or cause denial-of-service conditions on affected systems. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly exploitable. The scope of impact is unchanged (S:U), but the consequences affect confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). The lack of authentication requirements and the critical nature of the backend database elevate the risk. Although no active exploits have been reported, the presence of multiple known CVEs in the PostgreSQL version used by AxxonOne C-Werk makes this a significant threat. The vulnerability underscores the risks associated with third-party software dependencies and the importance of timely patching and component updates.

Potential Impact

For European organizations, especially those in sectors relying on AxxonSoft AxxonOne C-Werk for security and surveillance operations, this vulnerability poses a severe risk. Successful exploitation could lead to unauthorized access to sensitive video surveillance data, manipulation or deletion of critical logs, and disruption of security monitoring services. This could compromise physical security, data privacy, and operational continuity. The ability to execute arbitrary code remotely without authentication means attackers could establish persistent footholds within networks, potentially moving laterally to other critical systems. Denial-of-service conditions could incapacitate surveillance systems during critical events, increasing organizational risk. Given the critical infrastructure and public safety applications of such systems in Europe, the impact extends beyond individual organizations to national security and public safety. Additionally, regulatory compliance risks arise if personal data processed by these systems is exposed or manipulated, potentially violating GDPR requirements.

Mitigation Recommendations

European organizations should immediately assess their deployment of AxxonSoft AxxonOne C-Werk and identify systems running versions 2.0.8 or earlier. The primary mitigation is to upgrade the PostgreSQL backend to version 17.4 or later, which contains patches for all known vulnerabilities exploited in this CVE. If immediate upgrade is not feasible, organizations should isolate affected systems within segmented network zones with strict access controls to limit exposure. Implement network-level firewall rules to restrict inbound and outbound traffic to trusted sources only. Continuous monitoring for unusual PostgreSQL activity, such as unexpected connections or commands, should be established using IDS/IPS solutions and log analysis. Employ application-layer firewalls or database activity monitoring tools to detect and block exploitation attempts. Regularly review and update third-party component inventories to prevent similar risks. Finally, coordinate with AxxonSoft for official patches or guidance and ensure all security advisories are promptly applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AxxonSoft
Date Reserved
2025-09-10T12:37:44.975Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c17661e55cc6e90da1cfa3

Added to database: 9/10/2025, 1:00:17 PM

Last enriched: 10/8/2025, 12:14:53 PM

Last updated: 10/27/2025, 1:26:28 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats