CVE-2025-13064: CWE-248: Uncaught Exception in Axis Communications AB AXIS Camera Station Pro
CVE-2025-13064 is a medium severity vulnerability in Axis Communications AB's AXIS Camera Station Pro version 6. It involves a server-side injection caused by an uncaught exception (CWE-248) that allows a malicious administrator, using a tampered client, to inject and execute malicious scripts on the server. The vulnerability requires high privileges (admin access) and no user interaction. Exploitation impacts availability but not confidentiality or integrity, and no known exploits are currently in the wild. The attack vector is remote and requires an authenticated attacker using a compromised client. European organizations using AXIS Camera Station Pro for video surveillance could face service disruptions if exploited. Mitigation involves ensuring client integrity, restricting admin client usage, and monitoring for anomalous server behavior. Countries with high adoption of Axis surveillance products and critical infrastructure reliance on video monitoring, such as Germany, France, the UK, and the Netherlands, are most likely affected. Given the limited impact scope and exploitation complexity, the severity is medium.
AI Analysis
Technical Summary
CVE-2025-13064 is a vulnerability identified in Axis Communications AB's AXIS Camera Station Pro version 6, classified under CWE-248 (Uncaught Exception). The flaw allows a malicious administrator, who must have high-level privileges and use a tampered client application, to perform a server-side injection attack. This injection enables the attacker to manipulate the application to include and execute malicious scripts on the server side. The vulnerability arises because the application does not properly handle exceptions, allowing the injection to bypass normal validation or sanitization routines. The attack vector is remote and requires authenticated access with administrator privileges, but no user interaction is needed beyond the attacker using a compromised client. The CVSS v3.1 score is 4.5, reflecting a medium severity primarily due to the impact on availability (denial of service or disruption of service) without affecting confidentiality or integrity. No patches or known exploits are currently documented, but the risk exists in environments where administrators might use compromised clients, potentially due to insufficient endpoint security. This vulnerability could lead to service outages or degraded performance of the video management system, impacting surveillance operations. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not eliminate operational risks. The vulnerability highlights the importance of securing administrative endpoints and ensuring robust exception handling in server applications.
Potential Impact
For European organizations, particularly those relying on AXIS Camera Station Pro for critical video surveillance and security monitoring, this vulnerability could cause significant availability issues. Disruption or denial of service in surveillance systems can impair physical security monitoring, delay incident response, and reduce situational awareness. While confidentiality and integrity of data are not directly impacted, the loss of availability can have cascading effects on security operations, especially in sectors like transportation, government facilities, utilities, and large enterprises. The requirement for a tampered client limits the attack surface to scenarios where administrative endpoints are compromised, emphasizing the risk from insider threats or targeted endpoint attacks. Organizations with extensive Axis deployments may face operational downtime or require emergency incident response to restore service. The absence of known exploits reduces immediate risk but does not preclude future exploitation. Given the critical role of video surveillance in European critical infrastructure and public safety, even medium severity vulnerabilities warrant prompt attention.
Mitigation Recommendations
1. Enforce strict endpoint security controls on all administrative clients, including application whitelisting, anti-malware, and integrity verification to prevent client tampering. 2. Limit administrative access to AXIS Camera Station Pro to trusted, hardened devices and networks, employing network segmentation and VPNs where appropriate. 3. Implement multi-factor authentication for all administrator accounts to reduce risk of credential compromise. 4. Monitor server logs and application behavior for anomalies indicative of injection attempts or unexpected script execution. 5. Regularly audit and update administrative client software to detect and remediate tampering or unauthorized modifications. 6. Coordinate with Axis Communications for official patches or updates addressing this vulnerability once available. 7. Develop incident response plans specifically for video management system disruptions to minimize operational impact. 8. Conduct security awareness training for administrators on risks of using compromised clients and safe operational practices. 9. Consider deploying application-layer firewalls or intrusion detection systems that can detect and block injection patterns targeting the server. 10. Maintain backups and recovery procedures for the video management system to restore service quickly if disruption occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-13064: CWE-248: Uncaught Exception in Axis Communications AB AXIS Camera Station Pro
Description
CVE-2025-13064 is a medium severity vulnerability in Axis Communications AB's AXIS Camera Station Pro version 6. It involves a server-side injection caused by an uncaught exception (CWE-248) that allows a malicious administrator, using a tampered client, to inject and execute malicious scripts on the server. The vulnerability requires high privileges (admin access) and no user interaction. Exploitation impacts availability but not confidentiality or integrity, and no known exploits are currently in the wild. The attack vector is remote and requires an authenticated attacker using a compromised client. European organizations using AXIS Camera Station Pro for video surveillance could face service disruptions if exploited. Mitigation involves ensuring client integrity, restricting admin client usage, and monitoring for anomalous server behavior. Countries with high adoption of Axis surveillance products and critical infrastructure reliance on video monitoring, such as Germany, France, the UK, and the Netherlands, are most likely affected. Given the limited impact scope and exploitation complexity, the severity is medium.
AI-Powered Analysis
Technical Analysis
CVE-2025-13064 is a vulnerability identified in Axis Communications AB's AXIS Camera Station Pro version 6, classified under CWE-248 (Uncaught Exception). The flaw allows a malicious administrator, who must have high-level privileges and use a tampered client application, to perform a server-side injection attack. This injection enables the attacker to manipulate the application to include and execute malicious scripts on the server side. The vulnerability arises because the application does not properly handle exceptions, allowing the injection to bypass normal validation or sanitization routines. The attack vector is remote and requires authenticated access with administrator privileges, but no user interaction is needed beyond the attacker using a compromised client. The CVSS v3.1 score is 4.5, reflecting a medium severity primarily due to the impact on availability (denial of service or disruption of service) without affecting confidentiality or integrity. No patches or known exploits are currently documented, but the risk exists in environments where administrators might use compromised clients, potentially due to insufficient endpoint security. This vulnerability could lead to service outages or degraded performance of the video management system, impacting surveillance operations. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not eliminate operational risks. The vulnerability highlights the importance of securing administrative endpoints and ensuring robust exception handling in server applications.
Potential Impact
For European organizations, particularly those relying on AXIS Camera Station Pro for critical video surveillance and security monitoring, this vulnerability could cause significant availability issues. Disruption or denial of service in surveillance systems can impair physical security monitoring, delay incident response, and reduce situational awareness. While confidentiality and integrity of data are not directly impacted, the loss of availability can have cascading effects on security operations, especially in sectors like transportation, government facilities, utilities, and large enterprises. The requirement for a tampered client limits the attack surface to scenarios where administrative endpoints are compromised, emphasizing the risk from insider threats or targeted endpoint attacks. Organizations with extensive Axis deployments may face operational downtime or require emergency incident response to restore service. The absence of known exploits reduces immediate risk but does not preclude future exploitation. Given the critical role of video surveillance in European critical infrastructure and public safety, even medium severity vulnerabilities warrant prompt attention.
Mitigation Recommendations
1. Enforce strict endpoint security controls on all administrative clients, including application whitelisting, anti-malware, and integrity verification to prevent client tampering. 2. Limit administrative access to AXIS Camera Station Pro to trusted, hardened devices and networks, employing network segmentation and VPNs where appropriate. 3. Implement multi-factor authentication for all administrator accounts to reduce risk of credential compromise. 4. Monitor server logs and application behavior for anomalies indicative of injection attempts or unexpected script execution. 5. Regularly audit and update administrative client software to detect and remediate tampering or unauthorized modifications. 6. Coordinate with Axis Communications for official patches or updates addressing this vulnerability once available. 7. Develop incident response plans specifically for video management system disruptions to minimize operational impact. 8. Conduct security awareness training for administrators on risks of using compromised clients and safe operational practices. 9. Consider deploying application-layer firewalls or intrusion detection systems that can detect and block injection patterns targeting the server. 10. Maintain backups and recovery procedures for the video management system to restore service quickly if disruption occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Axis
- Date Reserved
- 2025-11-12T13:05:30.353Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698ac9b04b57a58fa1e63dec
Added to database: 2/10/2026, 6:01:20 AM
Last enriched: 2/17/2026, 9:31:33 AM
Last updated: 2/21/2026, 12:18:05 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.