CVE-2025-12757: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Axis Communications AB AXIS Camera Station Pro
CVE-2025-12757 is a medium-severity path traversal vulnerability in Axis Communications AB's AXIS Camera Station Pro version 6. It allows a non-admin user with limited privileges to access information beyond their authorization by exploiting improper pathname restrictions. The vulnerability does not require user interaction and has a CVSS score of 4. 6, indicating limited confidentiality and integrity impact without affecting availability. No known exploits are currently in the wild. European organizations using AXIS Camera Station Pro, especially in critical infrastructure and surveillance sectors, should prioritize patching or applying mitigations to prevent unauthorized data exposure. Countries with high adoption of Axis products and strategic security interests are at greater risk. Mitigations include strict access control reviews, network segmentation, and monitoring for unusual file access patterns.
AI Analysis
Technical Summary
CVE-2025-12757 is a path traversal vulnerability classified under CWE-22, found in AXIS Camera Station Pro version 6, a video management software by Axis Communications AB. The flaw arises from improper limitation of pathname inputs, allowing a non-administrative user to manipulate file paths to access files or information outside their permitted directories. This bypasses intended access controls, potentially exposing sensitive configuration files, logs, or other data that should remain restricted. The vulnerability requires low attack complexity and no user interaction, but does require the attacker to have some level of privileges (non-admin user). The CVSS 3.1 base score is 4.6, reflecting limited confidentiality and integrity impact without availability effects. No public exploits or active exploitation campaigns have been reported to date. The vulnerability was reserved in November 2025 and published in February 2026. The absence of patches at the time of reporting suggests organizations must rely on compensating controls until official fixes are released. Given the nature of video management systems, unauthorized access to data could lead to privacy violations, intelligence gathering by adversaries, or further lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2025-12757 could be significant in sectors relying on AXIS Camera Station Pro for surveillance and security monitoring, such as government facilities, transportation hubs, critical infrastructure, and private enterprises. Unauthorized access to sensitive video management data could compromise operational security, reveal surveillance configurations, or expose personal data protected under GDPR. Although the vulnerability does not allow full administrative control or denial of service, the confidentiality breach risks could facilitate espionage, insider threats, or compliance violations. The medium severity score indicates a moderate risk, but the strategic importance of surveillance systems in Europe elevates the potential consequences. Organizations failing to address this vulnerability may face regulatory penalties and reputational damage if data exposure occurs.
Mitigation Recommendations
1. Immediately audit and restrict user privileges within AXIS Camera Station Pro to the minimum necessary, ensuring non-admin users cannot access sensitive directories. 2. Implement network segmentation to isolate surveillance management systems from general user networks, reducing the attack surface. 3. Monitor file access logs and system behavior for unusual or unauthorized attempts to access restricted files or directories. 4. Apply application-layer controls such as web application firewalls (WAFs) to detect and block path traversal attempts. 5. Engage with Axis Communications for official patches or updates and prioritize their deployment once available. 6. Conduct regular security assessments and penetration testing focused on access control weaknesses in surveillance infrastructure. 7. Educate system administrators on secure configuration practices and the risks associated with path traversal vulnerabilities. 8. Consider deploying endpoint detection and response (EDR) solutions on servers hosting AXIS Camera Station Pro to detect lateral movement attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium, Poland, Norway
CVE-2025-12757: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Axis Communications AB AXIS Camera Station Pro
Description
CVE-2025-12757 is a medium-severity path traversal vulnerability in Axis Communications AB's AXIS Camera Station Pro version 6. It allows a non-admin user with limited privileges to access information beyond their authorization by exploiting improper pathname restrictions. The vulnerability does not require user interaction and has a CVSS score of 4. 6, indicating limited confidentiality and integrity impact without affecting availability. No known exploits are currently in the wild. European organizations using AXIS Camera Station Pro, especially in critical infrastructure and surveillance sectors, should prioritize patching or applying mitigations to prevent unauthorized data exposure. Countries with high adoption of Axis products and strategic security interests are at greater risk. Mitigations include strict access control reviews, network segmentation, and monitoring for unusual file access patterns.
AI-Powered Analysis
Technical Analysis
CVE-2025-12757 is a path traversal vulnerability classified under CWE-22, found in AXIS Camera Station Pro version 6, a video management software by Axis Communications AB. The flaw arises from improper limitation of pathname inputs, allowing a non-administrative user to manipulate file paths to access files or information outside their permitted directories. This bypasses intended access controls, potentially exposing sensitive configuration files, logs, or other data that should remain restricted. The vulnerability requires low attack complexity and no user interaction, but does require the attacker to have some level of privileges (non-admin user). The CVSS 3.1 base score is 4.6, reflecting limited confidentiality and integrity impact without availability effects. No public exploits or active exploitation campaigns have been reported to date. The vulnerability was reserved in November 2025 and published in February 2026. The absence of patches at the time of reporting suggests organizations must rely on compensating controls until official fixes are released. Given the nature of video management systems, unauthorized access to data could lead to privacy violations, intelligence gathering by adversaries, or further lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2025-12757 could be significant in sectors relying on AXIS Camera Station Pro for surveillance and security monitoring, such as government facilities, transportation hubs, critical infrastructure, and private enterprises. Unauthorized access to sensitive video management data could compromise operational security, reveal surveillance configurations, or expose personal data protected under GDPR. Although the vulnerability does not allow full administrative control or denial of service, the confidentiality breach risks could facilitate espionage, insider threats, or compliance violations. The medium severity score indicates a moderate risk, but the strategic importance of surveillance systems in Europe elevates the potential consequences. Organizations failing to address this vulnerability may face regulatory penalties and reputational damage if data exposure occurs.
Mitigation Recommendations
1. Immediately audit and restrict user privileges within AXIS Camera Station Pro to the minimum necessary, ensuring non-admin users cannot access sensitive directories. 2. Implement network segmentation to isolate surveillance management systems from general user networks, reducing the attack surface. 3. Monitor file access logs and system behavior for unusual or unauthorized attempts to access restricted files or directories. 4. Apply application-layer controls such as web application firewalls (WAFs) to detect and block path traversal attempts. 5. Engage with Axis Communications for official patches or updates and prioritize their deployment once available. 6. Conduct regular security assessments and penetration testing focused on access control weaknesses in surveillance infrastructure. 7. Educate system administrators on secure configuration practices and the risks associated with path traversal vulnerabilities. 8. Consider deploying endpoint detection and response (EDR) solutions on servers hosting AXIS Camera Station Pro to detect lateral movement attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Axis
- Date Reserved
- 2025-11-05T15:44:36.310Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698ac9b04b57a58fa1e63de9
Added to database: 2/10/2026, 6:01:20 AM
Last enriched: 2/17/2026, 9:31:22 AM
Last updated: 2/21/2026, 12:22:01 AM
Views: 114
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.