Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13064: CWE-248: Uncaught Exception in Axis Communications AB AXIS Camera Station Pro

0
Medium
VulnerabilityCVE-2025-13064cvecve-2025-13064cwe-248
Published: Tue Feb 10 2026 (02/10/2026, 05:40:34 UTC)
Source: CVE Database V5
Vendor/Project: Axis Communications AB
Product: AXIS Camera Station Pro

Description

CVE-2025-13064 is a medium severity vulnerability in Axis Communications AB's AXIS Camera Station Pro version 6. It involves a server-side injection caused by an uncaught exception (CWE-248) that allows a malicious administrator, using a tampered client, to inject and execute malicious scripts on the server. The vulnerability requires high privileges (admin access) and no user interaction. Exploitation impacts availability but not confidentiality or integrity, and no known exploits are currently in the wild. The attack vector is remote and requires an authenticated attacker using a compromised client. European organizations using AXIS Camera Station Pro for video surveillance could face service disruptions if exploited. Mitigation involves ensuring client integrity, restricting admin client usage, and monitoring for anomalous server behavior. Countries with high adoption of Axis surveillance products and critical infrastructure reliance on video monitoring, such as Germany, France, the UK, and the Netherlands, are most likely affected. Given the limited impact scope and exploitation complexity, the severity is medium.

AI-Powered Analysis

AILast updated: 02/17/2026, 09:31:33 UTC

Technical Analysis

CVE-2025-13064 is a vulnerability identified in Axis Communications AB's AXIS Camera Station Pro version 6, classified under CWE-248 (Uncaught Exception). The flaw allows a malicious administrator, who must have high-level privileges and use a tampered client application, to perform a server-side injection attack. This injection enables the attacker to manipulate the application to include and execute malicious scripts on the server side. The vulnerability arises because the application does not properly handle exceptions, allowing the injection to bypass normal validation or sanitization routines. The attack vector is remote and requires authenticated access with administrator privileges, but no user interaction is needed beyond the attacker using a compromised client. The CVSS v3.1 score is 4.5, reflecting a medium severity primarily due to the impact on availability (denial of service or disruption of service) without affecting confidentiality or integrity. No patches or known exploits are currently documented, but the risk exists in environments where administrators might use compromised clients, potentially due to insufficient endpoint security. This vulnerability could lead to service outages or degraded performance of the video management system, impacting surveillance operations. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not eliminate operational risks. The vulnerability highlights the importance of securing administrative endpoints and ensuring robust exception handling in server applications.

Potential Impact

For European organizations, particularly those relying on AXIS Camera Station Pro for critical video surveillance and security monitoring, this vulnerability could cause significant availability issues. Disruption or denial of service in surveillance systems can impair physical security monitoring, delay incident response, and reduce situational awareness. While confidentiality and integrity of data are not directly impacted, the loss of availability can have cascading effects on security operations, especially in sectors like transportation, government facilities, utilities, and large enterprises. The requirement for a tampered client limits the attack surface to scenarios where administrative endpoints are compromised, emphasizing the risk from insider threats or targeted endpoint attacks. Organizations with extensive Axis deployments may face operational downtime or require emergency incident response to restore service. The absence of known exploits reduces immediate risk but does not preclude future exploitation. Given the critical role of video surveillance in European critical infrastructure and public safety, even medium severity vulnerabilities warrant prompt attention.

Mitigation Recommendations

1. Enforce strict endpoint security controls on all administrative clients, including application whitelisting, anti-malware, and integrity verification to prevent client tampering. 2. Limit administrative access to AXIS Camera Station Pro to trusted, hardened devices and networks, employing network segmentation and VPNs where appropriate. 3. Implement multi-factor authentication for all administrator accounts to reduce risk of credential compromise. 4. Monitor server logs and application behavior for anomalies indicative of injection attempts or unexpected script execution. 5. Regularly audit and update administrative client software to detect and remediate tampering or unauthorized modifications. 6. Coordinate with Axis Communications for official patches or updates addressing this vulnerability once available. 7. Develop incident response plans specifically for video management system disruptions to minimize operational impact. 8. Conduct security awareness training for administrators on risks of using compromised clients and safe operational practices. 9. Consider deploying application-layer firewalls or intrusion detection systems that can detect and block injection patterns targeting the server. 10. Maintain backups and recovery procedures for the video management system to restore service quickly if disruption occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2025-11-12T13:05:30.353Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ac9b04b57a58fa1e63dec

Added to database: 2/10/2026, 6:01:20 AM

Last enriched: 2/17/2026, 9:31:33 AM

Last updated: 2/21/2026, 12:18:05 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats