CVE-2025-5718: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Axis Communications AB AXIS OS
The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
AI Analysis
Technical Summary
CVE-2025-5718 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following') affecting the ACAP Application framework in Axis Communications AB's AXIS OS version 12.0.0. The vulnerability arises because the framework does not properly validate symbolic links before accessing files, allowing an attacker to craft a symlink attack that leads to privilege escalation. Specifically, if an Axis device is configured to allow the installation of unsigned ACAP applications, an attacker can convince a legitimate user or administrator to install a malicious ACAP application containing a crafted symlink. This malicious app can exploit the improper link resolution to escalate privileges, potentially gaining higher system rights than intended. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but needs high privileges (PR:H) and user interaction (UI:R) to succeed. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning a successful exploit could fully compromise the device. No patches or known exploits are currently reported, but the vulnerability is published and assigned a CVSS v3.1 score of 6.8, indicating a medium severity. This vulnerability is particularly relevant for environments where unsigned ACAP app installation is enabled, which is not the default setting, thus limiting the attack surface but still posing a risk if misconfigured.
Potential Impact
For European organizations, especially those deploying Axis Communications devices in surveillance, physical security, or critical infrastructure monitoring, this vulnerability poses a significant risk. Successful exploitation could allow attackers to escalate privileges on the device, potentially leading to unauthorized access to sensitive video feeds, manipulation or disruption of security monitoring, and lateral movement within internal networks. The confidentiality of surveillance data could be compromised, integrity of device configurations altered, and availability of security services disrupted. Given the reliance on Axis devices in sectors like transportation, government facilities, and utilities across Europe, the impact could extend to national security and public safety. The requirement for user interaction and installation of unsigned apps limits mass exploitation but targeted attacks against high-value organizations remain a concern. The absence of known exploits suggests a window for proactive mitigation before active exploitation occurs.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify and disable the installation of unsigned ACAP applications on all Axis devices unless absolutely necessary. This setting is the primary enabler of the attack vector. Implement strict access controls and user permissions to prevent unauthorized app installations, ensuring only trusted administrators can deploy ACAP applications. Conduct regular audits of installed ACAP apps to detect any unauthorized or suspicious applications. Network segmentation should be employed to isolate Axis devices from general user networks, reducing exposure to potential attackers. Monitoring and alerting for unusual device behavior or installation attempts can provide early detection. Organizations should also engage with Axis Communications for any forthcoming patches or updates addressing this vulnerability and plan timely deployment. Additionally, educating users and administrators about the risks of installing unsigned applications and social engineering tactics can reduce the likelihood of successful exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-5718: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Axis Communications AB AXIS OS
Description
The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
AI-Powered Analysis
Technical Analysis
CVE-2025-5718 is a vulnerability classified under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following') affecting the ACAP Application framework in Axis Communications AB's AXIS OS version 12.0.0. The vulnerability arises because the framework does not properly validate symbolic links before accessing files, allowing an attacker to craft a symlink attack that leads to privilege escalation. Specifically, if an Axis device is configured to allow the installation of unsigned ACAP applications, an attacker can convince a legitimate user or administrator to install a malicious ACAP application containing a crafted symlink. This malicious app can exploit the improper link resolution to escalate privileges, potentially gaining higher system rights than intended. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but needs high privileges (PR:H) and user interaction (UI:R) to succeed. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning a successful exploit could fully compromise the device. No patches or known exploits are currently reported, but the vulnerability is published and assigned a CVSS v3.1 score of 6.8, indicating a medium severity. This vulnerability is particularly relevant for environments where unsigned ACAP app installation is enabled, which is not the default setting, thus limiting the attack surface but still posing a risk if misconfigured.
Potential Impact
For European organizations, especially those deploying Axis Communications devices in surveillance, physical security, or critical infrastructure monitoring, this vulnerability poses a significant risk. Successful exploitation could allow attackers to escalate privileges on the device, potentially leading to unauthorized access to sensitive video feeds, manipulation or disruption of security monitoring, and lateral movement within internal networks. The confidentiality of surveillance data could be compromised, integrity of device configurations altered, and availability of security services disrupted. Given the reliance on Axis devices in sectors like transportation, government facilities, and utilities across Europe, the impact could extend to national security and public safety. The requirement for user interaction and installation of unsigned apps limits mass exploitation but targeted attacks against high-value organizations remain a concern. The absence of known exploits suggests a window for proactive mitigation before active exploitation occurs.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify and disable the installation of unsigned ACAP applications on all Axis devices unless absolutely necessary. This setting is the primary enabler of the attack vector. Implement strict access controls and user permissions to prevent unauthorized app installations, ensuring only trusted administrators can deploy ACAP applications. Conduct regular audits of installed ACAP apps to detect any unauthorized or suspicious applications. Network segmentation should be employed to isolate Axis devices from general user networks, reducing exposure to potential attackers. Monitoring and alerting for unusual device behavior or installation attempts can provide early detection. Organizations should also engage with Axis Communications for any forthcoming patches or updates addressing this vulnerability and plan timely deployment. Additionally, educating users and administrators about the risks of installing unsigned applications and social engineering tactics can reduce the likelihood of successful exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Axis
- Date Reserved
- 2025-06-05T06:47:16.056Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912de4da26e42951cdeabd2
Added to database: 11/11/2025, 6:57:17 AM
Last enriched: 12/11/2025, 9:13:47 PM
Last updated: 1/7/2026, 8:46:33 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.