Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5454: CWE-35: Path Traversal: '.../...//' in Axis Communications AB AXIS OS

0
Medium
VulnerabilityCVE-2025-5454cvecve-2025-5454cwe-35
Published: Tue Nov 11 2025 (11/11/2025, 06:50:19 UTC)
Source: CVE Database V5
Vendor/Project: Axis Communications AB
Product: AXIS OS

Description

An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

AI-Powered Analysis

AILast updated: 11/11/2025, 07:12:42 UTC

Technical Analysis

CVE-2025-5454 is a path traversal vulnerability classified under CWE-35 affecting AXIS OS version 12.0.0, developed by Axis Communications AB. The root cause is insufficient input validation in an ACAP (Axis Camera Application Platform) configuration file, which allows an attacker to use path traversal sequences ('.../...//') to access unauthorized filesystem locations. This can lead to privilege escalation by enabling the attacker to manipulate or overwrite sensitive files or configurations. The vulnerability requires the device to be configured to allow installation of unsigned ACAP applications, which is not the default setting, and an attacker must convince a user or administrator to install a malicious ACAP application. Once installed, the malicious application can exploit the path traversal flaw without further user interaction. The CVSS v3.1 base score is 6.4, reflecting a medium severity with high impact on confidentiality, integrity, and availability, but requiring local access (AV:L), high attack complexity (AC:H), and high privileges (PR:H). No known public exploits have been reported yet, and no patches are currently linked, indicating a need for vigilance and proactive mitigation. This vulnerability is significant because Axis devices are widely used in surveillance and security systems, and exploitation could compromise critical monitoring infrastructure.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to those deploying Axis network devices, especially in security, surveillance, and critical infrastructure sectors. Successful exploitation could lead to unauthorized access to sensitive data, manipulation of device configurations, or disruption of surveillance operations, impacting confidentiality, integrity, and availability. This could undermine physical security monitoring and incident response capabilities. The requirement for installation of unsigned ACAP applications limits the attack surface but also indicates insider threat or social engineering risks. Organizations relying on Axis devices in government, transportation, energy, and large enterprises could face operational disruptions and potential regulatory compliance issues under GDPR if personal data is compromised. The lack of known exploits suggests a window for mitigation before active attacks emerge.

Mitigation Recommendations

European organizations should immediately audit their Axis device configurations to ensure that installation of unsigned ACAP applications is disabled unless absolutely necessary. If unsigned app installation is required, implement strict controls and verification processes for any ACAP applications installed. Monitor device logs for unusual installation activities or configuration changes. Network segmentation should isolate Axis devices from broader enterprise networks to limit lateral movement in case of compromise. Employ strong access controls and multi-factor authentication for device management interfaces. Regularly check for vendor updates or patches addressing this vulnerability and apply them promptly once available. Conduct user awareness training to prevent social engineering attempts that could lead to malicious ACAP app installation. Additionally, consider deploying endpoint detection and response (EDR) solutions capable of detecting anomalous behaviors on these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2025-06-02T08:24:52.053Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912de4da26e42951cdeabcf

Added to database: 11/11/2025, 6:57:17 AM

Last enriched: 11/11/2025, 7:12:42 AM

Last updated: 11/15/2025, 6:15:23 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats