← Zuruck zu CVEs
CVE-2025-5452
MEDIUM6.6
Beschreibung
A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
CVE Details
CVSS v3.1 Bewertung6.6
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatHIGH
Erforderliche PrivilegienHIGH
BenutzerinteraktionNONE
Veroffentlicht11/11/2025
Zuletzt geandert11/24/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
axis:a1210_\(-b\)axis:a1214axis:a1601axis:a1610_\(-b\)axis:a1710-baxis:a1810-baxis:a8207-ve_mk_iiaxis:axis_osaxis:c1110-eaxis:c1111-eaxis:c1210-eaxis:c1211-eaxis:c1310-e_mk_iiaxis:c1410_mk_iiaxis:c1510axis:c1511axis:c1610-veaxis:c1710axis:c1720axis:c6110axis:c8110axis:c8210axis:d1110axis:d201-s_xpt_q6075axis:d2110-veaxis:d2210-veaxis:d3110_mk_iiaxis:d4100-ve_mk_iiaxis:d4200-veaxis:d6310axis:excam_xf_q1785axis:excam_xpt_q6075axis:f9104-b_main_unitaxis:f9104-b_mk_ii_main_unitaxis:f9111-r_mk_ii_main_unitaxis:f9111_main_unitaxis:f9111_mk_ii_main_unitaxis:f9114-b-r_mk_ii_main_unitaxis:f9114-b_main_unitaxis:f9114-btaxis:f9114_main_unitaxis:fa51axis:fa51-baxis:fa54axis:i7010-safetyaxis:i7010-veaxis:i7020axis:i8016-lveaxis:i8116-eaxis:i8307-veaxis:m1055-laxis:m1075-laxis:m1135axis:m1135-e_mk_iiaxis:m1137axis:m1137-e_mk_iiaxis:m2035-leaxis:m2036-leaxis:m3057-plr_mk_iiaxis:m3085-vaxis:m3086-vaxis:m3086-v_micaxis:m3088-vaxis:m3125-lveaxis:m3126-lveaxis:m3128-lveaxis:m3215-lveaxis:m3216-lveaxis:m3905-raxis:m4215-lvaxis:m4215-vaxis:m4216-lvaxis:m4216-vaxis:m4218-lvaxis:m4218-vaxis:m4225-lveaxis:m4227-lveaxis:m4228-lveaxis:m4308-pleaxis:m4317-plraxis:m4317-plveaxis:m4318-plraxis:m4318-plveaxis:m4327-paxis:m4328-paxis:m5000axis:m5000-gaxis:m5074axis:m5075axis:m5075-gaxis:m5526-eaxis:m7104axis:m7116axis:p1245_mk_iiaxis:p1265_mk_iiaxis:p1275_mk_iiaxis:p1385axis:p1385-baxis:p1385-beaxis:p1385-eaxis:p1387axis:p1387-baxis:p1387-beaxis:p1387-leaxis:p1388axis:p1388-baxis:p1388-beaxis:p1388-leaxis:p1465-leaxis:p1465-le-3axis:p1467-leaxis:p1468-leaxis:p1468-xleaxis:p1475-leaxis:p1518-eaxis:p1518-leaxis:p3265-lvaxis:p3265-lveaxis:p3265-lve-3axis:p3265-vaxis:p3267-lvaxis:p3267-lveaxis:p3267-lve_micaxis:p3268-lvaxis:p3268-lveaxis:p3268-slveaxis:p3275-lvaxis:p3275-lveaxis:p3277-lvaxis:p3277-lveaxis:p3278-lvaxis:p3278-lveaxis:p3285-lvaxis:p3285-lveaxis:p3287-lvaxis:p3287-lveaxis:p3288-lvaxis:p3288-lveaxis:p3735-pleaxis:p3737-pleaxis:p3738-pleaxis:p3747-plveaxis:p3748-plveaxis:p3818-pveaxis:p3827-pveaxis:p3905-r_mk_iiiaxis:p3925-lreaxis:p3925-raxis:p3935-lraxis:p4705-plveaxis:p4707-plveaxis:p4708-plveaxis:p5654-eaxis:p5654-e_mk_iiaxis:p5655-eaxis:p5676-leaxis:p7304axis:p7316axis:p9117-pvaxis:q1615-le_mk_iiiaxis:q1615_mk_iiiaxis:q1656axis:q1656-baxis:q1656-beaxis:q1656-bleaxis:q1656-dleaxis:q1656-leaxis:q1686-dleaxis:q1715axis:q1728axis:q1728-leaxis:q1798-leaxis:q1800-leaxis:q1800-le-3axis:q1805-leaxis:q1806-leaxis:q1808-leaxis:q1809-leaxis:q1961-teaxis:q1961-xteaxis:q1971-eaxis:q1972-eaxis:q2101-teaxis:q2111-eaxis:q2112-eaxis:q3536-lveaxis:q3538-lveaxis:q3538-slveaxis:q3546-lveaxis:q3548-lveaxis:q3556-lveaxis:q3558-lveaxis:q3626-veaxis:q3628-veaxis:q3819-pveaxis:q3839-pveaxis:q3839-spveaxis:q4809-pveaxis:q6020-eaxis:q6074axis:q6074-eaxis:q6075axis:q6075-eaxis:q6075-saxis:q6075-seaxis:q6078-eaxis:q6135-leaxis:q6225-leaxis:q6300-eaxis:q6315-leaxis:q6318-leaxis:q6355-leaxis:q6358-leaxis:q8615-eaxis:q8752-eaxis:q8752-e_mk_iiaxis:q9307-lvaxis:s3008axis:s3008_mk_iiaxis:s3016axis:s4000axis:v5925axis:v5938axis:w100axis:w101axis:w102axis:w110axis:w120axis:w401axis:xc1311axis:xf40-q1785axis:xfq1656axis:xpq1785
Schwachen (CWE)
CWE-214
Referenzen
https://www.axis.com/dam/public/39/ba/8b/cve-2025-5452pdf-en-US-504212.pdf(product-security@axis.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.