Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5718: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Axis Communications AB AXIS OS

0
Medium
VulnerabilityCVE-2025-5718cvecve-2025-5718cwe-59
Published: Tue Nov 11 2025 (11/11/2025, 06:52:33 UTC)
Source: CVE Database V5
Vendor/Project: Axis Communications AB
Product: AXIS OS

Description

The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:13:47 UTC

Technical Analysis

CVE-2025-5718 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following') affecting the ACAP Application framework in Axis Communications AB's AXIS OS version 12.0.0. The vulnerability arises because the framework does not properly validate symbolic links before accessing files, allowing an attacker to craft a symlink attack that leads to privilege escalation. Specifically, if an Axis device is configured to allow the installation of unsigned ACAP applications, an attacker can convince a legitimate user or administrator to install a malicious ACAP application containing a crafted symlink. This malicious app can exploit the improper link resolution to escalate privileges, potentially gaining higher system rights than intended. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but needs high privileges (PR:H) and user interaction (UI:R) to succeed. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning a successful exploit could fully compromise the device. No patches or known exploits are currently reported, but the vulnerability is published and assigned a CVSS v3.1 score of 6.8, indicating a medium severity. This vulnerability is particularly relevant for environments where unsigned ACAP app installation is enabled, which is not the default setting, thus limiting the attack surface but still posing a risk if misconfigured.

Potential Impact

For European organizations, especially those deploying Axis Communications devices in surveillance, physical security, or critical infrastructure monitoring, this vulnerability poses a significant risk. Successful exploitation could allow attackers to escalate privileges on the device, potentially leading to unauthorized access to sensitive video feeds, manipulation or disruption of security monitoring, and lateral movement within internal networks. The confidentiality of surveillance data could be compromised, integrity of device configurations altered, and availability of security services disrupted. Given the reliance on Axis devices in sectors like transportation, government facilities, and utilities across Europe, the impact could extend to national security and public safety. The requirement for user interaction and installation of unsigned apps limits mass exploitation but targeted attacks against high-value organizations remain a concern. The absence of known exploits suggests a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify and disable the installation of unsigned ACAP applications on all Axis devices unless absolutely necessary. This setting is the primary enabler of the attack vector. Implement strict access controls and user permissions to prevent unauthorized app installations, ensuring only trusted administrators can deploy ACAP applications. Conduct regular audits of installed ACAP apps to detect any unauthorized or suspicious applications. Network segmentation should be employed to isolate Axis devices from general user networks, reducing exposure to potential attackers. Monitoring and alerting for unusual device behavior or installation attempts can provide early detection. Organizations should also engage with Axis Communications for any forthcoming patches or updates addressing this vulnerability and plan timely deployment. Additionally, educating users and administrators about the risks of installing unsigned applications and social engineering tactics can reduce the likelihood of successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2025-06-05T06:47:16.056Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912de4da26e42951cdeabd2

Added to database: 11/11/2025, 6:57:17 AM

Last enriched: 12/11/2025, 9:13:47 PM

Last updated: 1/7/2026, 8:46:33 AM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats