Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11547: CWE-532: Insertion of Sensitive Information into Log File in Axis Communications AB AXIS Camera Station Pro

0
High
VulnerabilityCVE-2025-11547cvecve-2025-11547cwe-532
Published: Tue Feb 10 2026 (02/10/2026, 05:35:50 UTC)
Source: CVE Database V5
Vendor/Project: Axis Communications AB
Product: AXIS Camera Station Pro

Description

CVE-2025-11547 is a high-severity vulnerability in AXIS Camera Station Pro version 6. 11 that allows a non-admin user to escalate privileges on the server. The flaw involves insertion of sensitive information into log files (CWE-532), which can be exploited to gain elevated access. The vulnerability has a CVSS score of 7. 8, indicating significant impact on confidentiality, integrity, and availability without requiring user interaction but needing local access with limited privileges. No known exploits are currently reported in the wild. European organizations using AXIS Camera Station Pro, especially critical infrastructure and security-sensitive sectors, are at risk. Mitigation requires applying vendor patches once available, restricting local user access, and monitoring logs for suspicious entries. Countries with high adoption of Axis products and strategic security infrastructure, such as Germany, France, UK, and the Nordics, are most likely affected.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:24:57 UTC

Technical Analysis

CVE-2025-11547 is a vulnerability identified in AXIS Camera Station Pro version 6.11, a video management software widely used for surveillance and security monitoring. The vulnerability is categorized under CWE-532, which involves the insertion of sensitive information into log files. This flaw enables a non-administrative user with local access to perform a privilege escalation attack on the server hosting the software. Specifically, the vulnerability allows an attacker with limited privileges to manipulate log files or exploit the logging mechanism to gain higher-level administrative rights. The CVSS 3.1 base score of 7.8 reflects a high severity, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability poses a significant risk due to the critical nature of the software in physical security environments. The flaw could allow attackers to compromise the integrity of surveillance data, disrupt monitoring capabilities, or gain unauthorized control over security infrastructure. The lack of available patches at the time of reporting necessitates immediate risk mitigation through access control and monitoring.

Potential Impact

For European organizations, the impact of CVE-2025-11547 is substantial, particularly for entities relying on AXIS Camera Station Pro for security surveillance, such as government facilities, transportation hubs, critical infrastructure, and large enterprises. Successful exploitation could lead to unauthorized administrative access, allowing attackers to manipulate or disable surveillance systems, tamper with recorded footage, or use the compromised system as a foothold for further network intrusion. This threatens confidentiality by exposing sensitive video data, integrity by enabling alteration or deletion of logs and recordings, and availability by potentially disabling security monitoring. The local attack vector means that insider threats or attackers who gain initial limited access can escalate privileges, increasing the risk of insider attacks or lateral movement within networks. Given the reliance on physical security systems in Europe, disruption or compromise could have cascading effects on public safety and organizational security posture.

Mitigation Recommendations

Immediate mitigation should focus on restricting local access to AXIS Camera Station Pro servers to trusted personnel only, employing strict user account controls and monitoring for unusual access patterns. Organizations should implement enhanced logging and real-time alerting for suspicious log file modifications or privilege escalations. Network segmentation can limit the exposure of the surveillance system to only necessary network zones. Until an official patch is released by Axis Communications, consider deploying host-based intrusion detection systems (HIDS) to detect anomalous behavior indicative of exploitation attempts. Regularly audit user privileges and remove unnecessary local accounts with access to the system. Once available, promptly apply vendor patches or updates addressing this vulnerability. Additionally, conduct security awareness training for staff to recognize potential insider threats and enforce strong authentication mechanisms for local access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2025-10-09T09:07:50.890Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ac9b04b57a58fa1e63de6

Added to database: 2/10/2026, 6:01:20 AM

Last enriched: 2/17/2026, 9:24:57 AM

Last updated: 2/21/2026, 12:18:51 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats