Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9055: CWE-250: Execution with Unnecessary Privileges in Axis Communications AB AXIS OS

0
Medium
VulnerabilityCVE-2025-9055cvecve-2025-9055cwe-250
Published: Tue Nov 11 2025 (11/11/2025, 07:31:00 UTC)
Source: CVE Database V5
Vendor/Project: Axis Communications AB
Product: AXIS OS

Description

The VAPIX Edge storage API that allowed a privilege escalation, enabling a VAPIX administrator-privileged user to gain Linux Root privileges. This flaw can only be exploited after authenticating with an administrator-privileged service account.

AI-Powered Analysis

AILast updated: 12/11/2025, 21:15:24 UTC

Technical Analysis

CVE-2025-9055 is a vulnerability classified under CWE-250 (Execution with Unnecessary Privileges) affecting Axis Communications AB's AXIS OS version 12.0.0. The flaw resides in the VAPIX Edge storage API, which improperly handles privilege separation, allowing a user with administrator-level privileges on the VAPIX service to escalate their privileges to Linux root on the device. This escalation is significant because root access grants full control over the underlying operating system, enabling attackers to manipulate system files, install persistent malware, or disrupt device functionality. The vulnerability requires authentication with an administrator-privileged service account, meaning that exploitation cannot occur remotely by unauthenticated attackers but rather by insiders or attackers who have already compromised administrator credentials. The CVSS v3.1 score of 6.4 reflects a medium severity, considering the attack vector is local (AV:L), requires high attack complexity (AC:H), and high privileges (PR:H), but does not require user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that successful exploitation could lead to complete device compromise. No public exploits or patches are currently available, so organizations must rely on compensating controls until a fix is released. The vulnerability affects AXIS OS 12.0.0, a platform widely used in network cameras and surveillance devices, which are critical components in physical security environments.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security and reliability of surveillance and security infrastructure relying on AXIS OS devices. Successful exploitation could allow attackers to gain root access, enabling them to disable security monitoring, manipulate video feeds, or use compromised devices as footholds for lateral movement within networks. This could lead to breaches of sensitive data, disruption of security operations, and potential physical security risks. Industries such as government, transportation, critical infrastructure, and large enterprises that deploy Axis network cameras extensively are particularly vulnerable. The requirement for administrator-level credentials limits the attack surface but also highlights the importance of protecting privileged accounts. The impact is compounded in environments where these devices are integrated into broader security management systems, potentially affecting multiple layers of organizational security.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement strict access controls on AXIS OS devices, ensuring that administrator-privileged accounts are tightly managed and monitored. Employ multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise. Network segmentation should be enforced to isolate surveillance devices from critical network segments, limiting lateral movement opportunities. Regularly audit and review administrator account activity and credentials for signs of misuse. Until a vendor patch is released, consider disabling or restricting the use of the VAPIX Edge storage API if feasible. Maintain up-to-date inventory of affected devices and subscribe to Axis Communications security advisories for timely patch deployment. Additionally, deploy intrusion detection systems to monitor for anomalous behavior indicative of privilege escalation attempts. Implement strict logging and alerting on administrative actions within AXIS OS environments to enable rapid incident response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2025-08-15T06:07:25.330Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912e86ab7bc43ed74661873

Added to database: 11/11/2025, 7:40:26 AM

Last enriched: 12/11/2025, 9:15:24 PM

Last updated: 2/3/2026, 11:46:47 PM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats