CVE-2025-5454: CWE-35: Path Traversal: '.../...//' in Axis Communications AB AXIS OS
An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
AI Analysis
Technical Summary
CVE-2025-5454 is a path traversal vulnerability identified in the ACAP configuration file handling of Axis Communications AB's AXIS OS, specifically version 12.0.0. The root cause is insufficient input validation of file paths, allowing an attacker to use path traversal sequences ('.../...//') to access files and directories outside the intended scope. This can lead to privilege escalation by enabling unauthorized access or modification of sensitive system files. The vulnerability is contingent upon two key conditions: the Axis device must be configured to allow installation of unsigned ACAP applications, and an attacker must convince a user or administrator to install a malicious ACAP application. ACAP (Axis Camera Application Platform) allows custom applications to run on Axis devices, and unsigned apps bypass signature verification, increasing risk. The CVSS 3.1 base score is 6.4 (medium), reflecting that exploitation requires local access with high privileges (AV:L, PR:H), high attack complexity (AC:H), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits are known, and no patches have been published yet. The vulnerability is tracked under CWE-35 (Path Traversal). Given the nature of Axis devices—commonly used in surveillance and security systems—this vulnerability could allow attackers to escalate privileges and potentially control or disrupt device operations if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-5454 could be significant, especially for those relying on Axis network devices for security surveillance and building management. Successful exploitation could lead to unauthorized access to sensitive files, modification of device configurations, or disruption of device availability, undermining physical security and operational continuity. This could affect critical infrastructure sectors such as transportation, government facilities, energy, and finance, where Axis devices are widely deployed. The requirement for local high-privilege access and installation of malicious unsigned ACAP apps limits the attack surface but does not eliminate risk, particularly in environments with weak internal controls or social engineering vulnerabilities. Compromise of these devices could also serve as a foothold for lateral movement within networks, increasing overall organizational risk.
Mitigation Recommendations
European organizations should immediately audit their Axis device configurations to ensure that the installation of unsigned ACAP applications is disabled unless absolutely necessary. Where unsigned app installation is required, strict controls and validation processes should be enforced to prevent unauthorized app deployment. Network segmentation should be applied to isolate Axis devices from broader enterprise networks, limiting access to trusted administrators only. Monitoring and logging of ACAP application installations and device configuration changes should be enabled to detect suspicious activities. Organizations should maintain up-to-date inventories of Axis devices and apply vendor patches promptly once available. Additionally, user training to prevent social engineering attacks that could lead to malicious app installation is critical. Employing endpoint protection and network intrusion detection systems to identify anomalous behavior on Axis devices can further reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-5454: CWE-35: Path Traversal: '.../...//' in Axis Communications AB AXIS OS
Description
An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
AI-Powered Analysis
Technical Analysis
CVE-2025-5454 is a path traversal vulnerability identified in the ACAP configuration file handling of Axis Communications AB's AXIS OS, specifically version 12.0.0. The root cause is insufficient input validation of file paths, allowing an attacker to use path traversal sequences ('.../...//') to access files and directories outside the intended scope. This can lead to privilege escalation by enabling unauthorized access or modification of sensitive system files. The vulnerability is contingent upon two key conditions: the Axis device must be configured to allow installation of unsigned ACAP applications, and an attacker must convince a user or administrator to install a malicious ACAP application. ACAP (Axis Camera Application Platform) allows custom applications to run on Axis devices, and unsigned apps bypass signature verification, increasing risk. The CVSS 3.1 base score is 6.4 (medium), reflecting that exploitation requires local access with high privileges (AV:L, PR:H), high attack complexity (AC:H), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits are known, and no patches have been published yet. The vulnerability is tracked under CWE-35 (Path Traversal). Given the nature of Axis devices—commonly used in surveillance and security systems—this vulnerability could allow attackers to escalate privileges and potentially control or disrupt device operations if exploited.
Potential Impact
For European organizations, the impact of CVE-2025-5454 could be significant, especially for those relying on Axis network devices for security surveillance and building management. Successful exploitation could lead to unauthorized access to sensitive files, modification of device configurations, or disruption of device availability, undermining physical security and operational continuity. This could affect critical infrastructure sectors such as transportation, government facilities, energy, and finance, where Axis devices are widely deployed. The requirement for local high-privilege access and installation of malicious unsigned ACAP apps limits the attack surface but does not eliminate risk, particularly in environments with weak internal controls or social engineering vulnerabilities. Compromise of these devices could also serve as a foothold for lateral movement within networks, increasing overall organizational risk.
Mitigation Recommendations
European organizations should immediately audit their Axis device configurations to ensure that the installation of unsigned ACAP applications is disabled unless absolutely necessary. Where unsigned app installation is required, strict controls and validation processes should be enforced to prevent unauthorized app deployment. Network segmentation should be applied to isolate Axis devices from broader enterprise networks, limiting access to trusted administrators only. Monitoring and logging of ACAP application installations and device configuration changes should be enabled to detect suspicious activities. Organizations should maintain up-to-date inventories of Axis devices and apply vendor patches promptly once available. Additionally, user training to prevent social engineering attacks that could lead to malicious app installation is critical. Employing endpoint protection and network intrusion detection systems to identify anomalous behavior on Axis devices can further reduce risk.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Axis
- Date Reserved
- 2025-06-02T08:24:52.053Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912de4da26e42951cdeabcf
Added to database: 11/11/2025, 6:57:17 AM
Last enriched: 12/11/2025, 9:13:24 PM
Last updated: 1/7/2026, 8:50:51 AM
Views: 60
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.