Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6779: CWE-732: Incorrect Permission Assignment for Critical Resource in Axis Communications AB AXIS OS

0
Medium
VulnerabilityCVE-2025-6779cvecve-2025-6779cwe-732
Published: Tue Nov 11 2025 (11/11/2025, 07:05:51 UTC)
Source: CVE Database V5
Vendor/Project: Axis Communications AB
Product: AXIS OS

Description

An ACAP configuration file has improper permissions, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:14:52 UTC

Technical Analysis

CVE-2025-6779 is a vulnerability identified in Axis Communications AB's AXIS OS, specifically version 12.0.0. The root cause is improper permission assignment (CWE-732) on an ACAP configuration file, which is critical for the device's application control. This misconfiguration allows an attacker to perform command injection, potentially leading to privilege escalation on the device. However, exploitation is conditional: the Axis device must be configured to permit installation of unsigned ACAP applications, and the attacker must convince a legitimate user to install a malicious ACAP application. ACAP (Axis Camera Application Platform) allows custom applications to run on Axis devices, which are commonly used in network video surveillance. The vulnerability's CVSS 3.1 score is 6.7 (medium severity), with vector AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating local attack vector, low attack complexity, high privileges required, no user interaction, unchanged scope, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, and no patches are currently linked, suggesting the need for proactive mitigation. This vulnerability could be leveraged to gain unauthorized control over Axis devices, potentially disrupting surveillance operations or exfiltrating sensitive video data.

Potential Impact

For European organizations, especially those relying on Axis network video devices for security and surveillance, this vulnerability poses a risk of unauthorized command execution and privilege escalation on critical infrastructure devices. Successful exploitation could lead to compromise of video feeds, disruption of security monitoring, and potential lateral movement within the network. Given the high confidentiality, integrity, and availability impact, attackers could manipulate or disable surveillance systems, undermining physical security and compliance with data protection regulations such as GDPR. The requirement for local access and high privileges limits remote exploitation but insider threats or compromised administrative accounts could facilitate attacks. Organizations in sectors like critical infrastructure, transportation, government, and large enterprises with extensive Axis device deployments are particularly at risk.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Disable the installation of unsigned ACAP applications unless absolutely necessary; enforce strict application signing policies. 2) Restrict administrative access to Axis devices to trusted personnel only, employing strong authentication and role-based access controls. 3) Monitor device logs and network traffic for unauthorized ACAP application installations or suspicious activity. 4) Apply any forthcoming patches or updates from Axis Communications promptly once available. 5) Conduct regular security audits of Axis devices and their configurations, focusing on permissions and application controls. 6) Educate users and administrators about the risks of installing untrusted ACAP applications to prevent social engineering exploitation. 7) Segment network zones to isolate surveillance devices from general IT infrastructure to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2025-06-27T11:40:34.225Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912e1d7a26e42951ce3f05e

Added to database: 11/11/2025, 7:12:23 AM

Last enriched: 12/11/2025, 9:14:52 PM

Last updated: 2/4/2026, 7:19:21 PM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats