Skip to main content

CVE-2025-1056: CWE-73: External Control of File Name or Path in Axis Communications AB AXIS Camera Station Pro

Medium
Published: Wed Apr 23 2025 (04/23/2025, 05:18:10 UTC)
Source: CVE
Vendor/Project: Axis Communications AB
Product: AXIS Camera Station Pro

Description

Gee-netics, member of AXIS Camera Station Pro Bug Bounty Program, has identified an issue with a specific file that the server is using. A non-admin user can modify this file to either create files or change the content of files in an admin-protected location. Axis has released a patched version for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.

AI-Powered Analysis

AILast updated: 06/22/2025, 06:37:17 UTC

Technical Analysis

CVE-2025-1056 is a vulnerability identified in Axis Communications AB's AXIS Camera Station Pro software, specifically version 6. The issue falls under CWE-73, which pertains to External Control of File Name or Path. This vulnerability allows a non-administrative user to manipulate a particular file used by the server in such a way that they can create new files or alter the contents of existing files located in directories that are normally protected and accessible only by administrators. Essentially, the flaw arises because the software does not properly restrict or validate the file paths or names that a non-admin user can influence, enabling unauthorized file system modifications. This can lead to unauthorized data manipulation or persistence of malicious files in sensitive locations. Although Axis Communications has released a patched version addressing this vulnerability, the affected version 6 remains vulnerable if not updated. The vulnerability does not require administrative privileges to exploit, nor does it require user interaction beyond the non-admin user's ability to modify the specific file. There are no known exploits in the wild at this time, but the potential for misuse exists given the nature of the flaw. The vulnerability impacts the confidentiality and integrity of the system by allowing unauthorized file modifications, and potentially availability if critical files are altered or replaced. The flaw is categorized as medium severity by the vendor, reflecting a moderate risk level given the access requirements and impact scope.

Potential Impact

For European organizations using AXIS Camera Station Pro version 6, this vulnerability poses a significant risk to the security of their video surveillance infrastructure. Unauthorized modification or creation of files in admin-protected locations could allow attackers or malicious insiders to tamper with video recordings, logs, or configuration files, undermining the integrity and reliability of surveillance data. This could impact incident investigations, compliance with data protection regulations such as GDPR, and overall physical security. Additionally, if attackers leverage this vulnerability to implant malicious files or scripts, it could serve as a foothold for further network compromise. Organizations in critical infrastructure sectors, government, transportation, and large enterprises that rely heavily on Axis surveillance products are particularly at risk. The medium severity rating suggests that while the vulnerability is not trivially exploitable remotely without some level of access, the consequences of exploitation could be disruptive and damaging to operational security and trust in surveillance systems.

Mitigation Recommendations

1. Immediate upgrade to the latest patched version of AXIS Camera Station Pro provided by Axis Communications to eliminate the vulnerability. 2. Implement strict access controls and monitoring on user accounts with non-admin privileges to limit the ability to modify files used by the server. 3. Employ file integrity monitoring solutions specifically targeting the directories and files used by AXIS Camera Station Pro to detect unauthorized changes promptly. 4. Conduct regular audits of user permissions and review logs for suspicious file modification activities. 5. Segment the network to isolate surveillance systems from general user networks, reducing the risk that a compromised non-admin user account could exploit this vulnerability. 6. Educate system administrators and security teams about this specific vulnerability and ensure that patch management processes prioritize this update. 7. If patching is delayed, consider temporary compensating controls such as restricting write permissions on the affected files or directories to only trusted administrative accounts, where feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Axis
Date Reserved
2025-02-05T07:29:10.344Z
Cisa Enriched
true

Threat ID: 682d9848c4522896dcbf5c6f

Added to database: 5/21/2025, 9:09:28 AM

Last enriched: 6/22/2025, 6:37:17 AM

Last updated: 8/17/2025, 11:01:09 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats