Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12757: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Axis Communications AB AXIS Camera Station Pro

0
Medium
VulnerabilityCVE-2025-12757cvecve-2025-12757cwe-22
Published: Tue Feb 10 2026 (02/10/2026, 05:47:20 UTC)
Source: CVE Database V5
Vendor/Project: Axis Communications AB
Product: AXIS Camera Station Pro

Description

CVE-2025-12757 is a medium-severity path traversal vulnerability in Axis Communications AB's AXIS Camera Station Pro version 6. It allows a non-admin user with limited privileges to access information beyond their authorization by exploiting improper pathname restrictions. The vulnerability does not require user interaction and has a CVSS score of 4. 6, indicating limited confidentiality and integrity impact without affecting availability. No known exploits are currently in the wild. European organizations using AXIS Camera Station Pro, especially in critical infrastructure and surveillance sectors, should prioritize patching or applying mitigations to prevent unauthorized data exposure. Countries with high adoption of Axis products and strategic security interests are at greater risk. Mitigations include strict access control reviews, network segmentation, and monitoring for unusual file access patterns.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:31:22 UTC

Technical Analysis

CVE-2025-12757 is a path traversal vulnerability classified under CWE-22, found in AXIS Camera Station Pro version 6, a video management software by Axis Communications AB. The flaw arises from improper limitation of pathname inputs, allowing a non-administrative user to manipulate file paths to access files or information outside their permitted directories. This bypasses intended access controls, potentially exposing sensitive configuration files, logs, or other data that should remain restricted. The vulnerability requires low attack complexity and no user interaction, but does require the attacker to have some level of privileges (non-admin user). The CVSS 3.1 base score is 4.6, reflecting limited confidentiality and integrity impact without availability effects. No public exploits or active exploitation campaigns have been reported to date. The vulnerability was reserved in November 2025 and published in February 2026. The absence of patches at the time of reporting suggests organizations must rely on compensating controls until official fixes are released. Given the nature of video management systems, unauthorized access to data could lead to privacy violations, intelligence gathering by adversaries, or further lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2025-12757 could be significant in sectors relying on AXIS Camera Station Pro for surveillance and security monitoring, such as government facilities, transportation hubs, critical infrastructure, and private enterprises. Unauthorized access to sensitive video management data could compromise operational security, reveal surveillance configurations, or expose personal data protected under GDPR. Although the vulnerability does not allow full administrative control or denial of service, the confidentiality breach risks could facilitate espionage, insider threats, or compliance violations. The medium severity score indicates a moderate risk, but the strategic importance of surveillance systems in Europe elevates the potential consequences. Organizations failing to address this vulnerability may face regulatory penalties and reputational damage if data exposure occurs.

Mitigation Recommendations

1. Immediately audit and restrict user privileges within AXIS Camera Station Pro to the minimum necessary, ensuring non-admin users cannot access sensitive directories. 2. Implement network segmentation to isolate surveillance management systems from general user networks, reducing the attack surface. 3. Monitor file access logs and system behavior for unusual or unauthorized attempts to access restricted files or directories. 4. Apply application-layer controls such as web application firewalls (WAFs) to detect and block path traversal attempts. 5. Engage with Axis Communications for official patches or updates and prioritize their deployment once available. 6. Conduct regular security assessments and penetration testing focused on access control weaknesses in surveillance infrastructure. 7. Educate system administrators on secure configuration practices and the risks associated with path traversal vulnerabilities. 8. Consider deploying endpoint detection and response (EDR) solutions on servers hosting AXIS Camera Station Pro to detect lateral movement attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2025-11-05T15:44:36.310Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ac9b04b57a58fa1e63de9

Added to database: 2/10/2026, 6:01:20 AM

Last enriched: 2/17/2026, 9:31:22 AM

Last updated: 2/21/2026, 12:22:01 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats