← Volver a CVEs
CVE-2025-5452
MEDIUM6.6
Descripcion
A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
Detalles CVE
Puntuacion CVSS v3.16.6
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadHIGH
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado11/11/2025
Ultima modificacion11/24/2025
Fuentenvd
Avistamientos honeypot0
Productos afectados
axis:a1210_\(-b\)axis:a1214axis:a1601axis:a1610_\(-b\)axis:a1710-baxis:a1810-baxis:a8207-ve_mk_iiaxis:axis_osaxis:c1110-eaxis:c1111-eaxis:c1210-eaxis:c1211-eaxis:c1310-e_mk_iiaxis:c1410_mk_iiaxis:c1510axis:c1511axis:c1610-veaxis:c1710axis:c1720axis:c6110axis:c8110axis:c8210axis:d1110axis:d201-s_xpt_q6075axis:d2110-veaxis:d2210-veaxis:d3110_mk_iiaxis:d4100-ve_mk_iiaxis:d4200-veaxis:d6310axis:excam_xf_q1785axis:excam_xpt_q6075axis:f9104-b_main_unitaxis:f9104-b_mk_ii_main_unitaxis:f9111-r_mk_ii_main_unitaxis:f9111_main_unitaxis:f9111_mk_ii_main_unitaxis:f9114-b-r_mk_ii_main_unitaxis:f9114-b_main_unitaxis:f9114-btaxis:f9114_main_unitaxis:fa51axis:fa51-baxis:fa54axis:i7010-safetyaxis:i7010-veaxis:i7020axis:i8016-lveaxis:i8116-eaxis:i8307-veaxis:m1055-laxis:m1075-laxis:m1135axis:m1135-e_mk_iiaxis:m1137axis:m1137-e_mk_iiaxis:m2035-leaxis:m2036-leaxis:m3057-plr_mk_iiaxis:m3085-vaxis:m3086-vaxis:m3086-v_micaxis:m3088-vaxis:m3125-lveaxis:m3126-lveaxis:m3128-lveaxis:m3215-lveaxis:m3216-lveaxis:m3905-raxis:m4215-lvaxis:m4215-vaxis:m4216-lvaxis:m4216-vaxis:m4218-lvaxis:m4218-vaxis:m4225-lveaxis:m4227-lveaxis:m4228-lveaxis:m4308-pleaxis:m4317-plraxis:m4317-plveaxis:m4318-plraxis:m4318-plveaxis:m4327-paxis:m4328-paxis:m5000axis:m5000-gaxis:m5074axis:m5075axis:m5075-gaxis:m5526-eaxis:m7104axis:m7116axis:p1245_mk_iiaxis:p1265_mk_iiaxis:p1275_mk_iiaxis:p1385axis:p1385-baxis:p1385-beaxis:p1385-eaxis:p1387axis:p1387-baxis:p1387-beaxis:p1387-leaxis:p1388axis:p1388-baxis:p1388-beaxis:p1388-leaxis:p1465-leaxis:p1465-le-3axis:p1467-leaxis:p1468-leaxis:p1468-xleaxis:p1475-leaxis:p1518-eaxis:p1518-leaxis:p3265-lvaxis:p3265-lveaxis:p3265-lve-3axis:p3265-vaxis:p3267-lvaxis:p3267-lveaxis:p3267-lve_micaxis:p3268-lvaxis:p3268-lveaxis:p3268-slveaxis:p3275-lvaxis:p3275-lveaxis:p3277-lvaxis:p3277-lveaxis:p3278-lvaxis:p3278-lveaxis:p3285-lvaxis:p3285-lveaxis:p3287-lvaxis:p3287-lveaxis:p3288-lvaxis:p3288-lveaxis:p3735-pleaxis:p3737-pleaxis:p3738-pleaxis:p3747-plveaxis:p3748-plveaxis:p3818-pveaxis:p3827-pveaxis:p3905-r_mk_iiiaxis:p3925-lreaxis:p3925-raxis:p3935-lraxis:p4705-plveaxis:p4707-plveaxis:p4708-plveaxis:p5654-eaxis:p5654-e_mk_iiaxis:p5655-eaxis:p5676-leaxis:p7304axis:p7316axis:p9117-pvaxis:q1615-le_mk_iiiaxis:q1615_mk_iiiaxis:q1656axis:q1656-baxis:q1656-beaxis:q1656-bleaxis:q1656-dleaxis:q1656-leaxis:q1686-dleaxis:q1715axis:q1728axis:q1728-leaxis:q1798-leaxis:q1800-leaxis:q1800-le-3axis:q1805-leaxis:q1806-leaxis:q1808-leaxis:q1809-leaxis:q1961-teaxis:q1961-xteaxis:q1971-eaxis:q1972-eaxis:q2101-teaxis:q2111-eaxis:q2112-eaxis:q3536-lveaxis:q3538-lveaxis:q3538-slveaxis:q3546-lveaxis:q3548-lveaxis:q3556-lveaxis:q3558-lveaxis:q3626-veaxis:q3628-veaxis:q3819-pveaxis:q3839-pveaxis:q3839-spveaxis:q4809-pveaxis:q6020-eaxis:q6074axis:q6074-eaxis:q6075axis:q6075-eaxis:q6075-saxis:q6075-seaxis:q6078-eaxis:q6135-leaxis:q6225-leaxis:q6300-eaxis:q6315-leaxis:q6318-leaxis:q6355-leaxis:q6358-leaxis:q8615-eaxis:q8752-eaxis:q8752-e_mk_iiaxis:q9307-lvaxis:s3008axis:s3008_mk_iiaxis:s3016axis:s4000axis:v5925axis:v5938axis:w100axis:w101axis:w102axis:w110axis:w120axis:w401axis:xc1311axis:xf40-q1785axis:xfq1656axis:xpq1785
Debilidades (CWE)
CWE-214
Referencias
https://www.axis.com/dam/public/39/ba/8b/cve-2025-5452pdf-en-US-504212.pdf(product-security@axis.com)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.