CVE-2025-6779: CWE-732: Incorrect Permission Assignment for Critical Resource in Axis Communications AB AXIS OS
An ACAP configuration file has improper permissions, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
AI Analysis
Technical Summary
CVE-2025-6779 is a vulnerability identified in Axis Communications AB's AXIS OS, specifically version 12.0.0. The root cause is improper permission assignment (CWE-732) on an ACAP configuration file, which is critical for the device's application control. This misconfiguration allows an attacker to perform command injection, potentially leading to privilege escalation on the device. However, exploitation is conditional: the Axis device must be configured to permit installation of unsigned ACAP applications, and the attacker must convince a legitimate user to install a malicious ACAP application. ACAP (Axis Camera Application Platform) allows custom applications to run on Axis devices, which are commonly used in network video surveillance. The vulnerability's CVSS 3.1 score is 6.7 (medium severity), with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, and no patches are currently linked, suggesting the need for proactive mitigation. This vulnerability could be leveraged to gain unauthorized control over Axis devices, potentially disrupting surveillance operations or exfiltrating sensitive video data.
Potential Impact
For European organizations, especially those relying on Axis network video devices for security and surveillance, this vulnerability poses a risk of unauthorized command execution and privilege escalation on critical infrastructure devices. Successful exploitation could lead to compromise of video feeds, disruption of security monitoring, and potential lateral movement within the network. Given the high confidentiality, integrity, and availability impact, attackers could manipulate or disable surveillance systems, undermining physical security and compliance with data protection regulations such as GDPR. The requirement for local access and high privileges limits remote exploitation but insider threats or compromised administrative accounts could facilitate attacks. Organizations in sectors like critical infrastructure, transportation, government, and large enterprises with extensive Axis device deployments are particularly at risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Disable the installation of unsigned ACAP applications unless absolutely necessary; enforce strict application signing policies. 2) Restrict administrative access to Axis devices to trusted personnel only, employing strong authentication and role-based access controls. 3) Monitor device logs and network traffic for unauthorized ACAP application installations or suspicious activity. 4) Apply any forthcoming patches or updates from Axis Communications promptly once available. 5) Conduct regular security audits of Axis devices and their configurations, focusing on permissions and application controls. 6) Educate users and administrators about the risks of installing untrusted ACAP applications to prevent social engineering exploitation. 7) Segment network zones to isolate surveillance devices from general IT infrastructure to limit lateral movement in case of compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2025-6779: CWE-732: Incorrect Permission Assignment for Critical Resource in Axis Communications AB AXIS OS
Description
An ACAP configuration file has improper permissions, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
AI-Powered Analysis
Technical Analysis
CVE-2025-6779 is a vulnerability identified in Axis Communications AB's AXIS OS, specifically version 12.0.0. The root cause is improper permission assignment (CWE-732) on an ACAP configuration file, which is critical for the device's application control. This misconfiguration allows an attacker to perform command injection, potentially leading to privilege escalation on the device. However, exploitation is conditional: the Axis device must be configured to permit installation of unsigned ACAP applications, and the attacker must convince a legitimate user to install a malicious ACAP application. ACAP (Axis Camera Application Platform) allows custom applications to run on Axis devices, which are commonly used in network video surveillance. The vulnerability's CVSS 3.1 score is 6.7 (medium severity), with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, and no patches are currently linked, suggesting the need for proactive mitigation. This vulnerability could be leveraged to gain unauthorized control over Axis devices, potentially disrupting surveillance operations or exfiltrating sensitive video data.
Potential Impact
For European organizations, especially those relying on Axis network video devices for security and surveillance, this vulnerability poses a risk of unauthorized command execution and privilege escalation on critical infrastructure devices. Successful exploitation could lead to compromise of video feeds, disruption of security monitoring, and potential lateral movement within the network. Given the high confidentiality, integrity, and availability impact, attackers could manipulate or disable surveillance systems, undermining physical security and compliance with data protection regulations such as GDPR. The requirement for local access and high privileges limits remote exploitation but insider threats or compromised administrative accounts could facilitate attacks. Organizations in sectors like critical infrastructure, transportation, government, and large enterprises with extensive Axis device deployments are particularly at risk.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Disable the installation of unsigned ACAP applications unless absolutely necessary; enforce strict application signing policies. 2) Restrict administrative access to Axis devices to trusted personnel only, employing strong authentication and role-based access controls. 3) Monitor device logs and network traffic for unauthorized ACAP application installations or suspicious activity. 4) Apply any forthcoming patches or updates from Axis Communications promptly once available. 5) Conduct regular security audits of Axis devices and their configurations, focusing on permissions and application controls. 6) Educate users and administrators about the risks of installing untrusted ACAP applications to prevent social engineering exploitation. 7) Segment network zones to isolate surveillance devices from general IT infrastructure to limit lateral movement in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Axis
- Date Reserved
- 2025-06-27T11:40:34.225Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912e1d7a26e42951ce3f05e
Added to database: 11/11/2025, 7:12:23 AM
Last enriched: 12/11/2025, 9:14:52 PM
Last updated: 2/4/2026, 7:19:21 PM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25140: CWE-400: Uncontrolled Resource Consumption in chainguard-dev apko
HighCVE-2026-25122: CWE-400: Uncontrolled Resource Consumption in chainguard-dev apko
MediumCVE-2026-25121: CWE-23: Relative Path Traversal in chainguard-dev apko
HighCVE-2026-0536: CWE-787 Out-of-bounds Write in Autodesk 3ds Max
HighCVE-2024-42642: n/a
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.