← Retour aux CVEs
CVE-2025-5452
MEDIUM6.6
Description
A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
Details CVE
Score CVSS v3.16.6
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisHIGH
Interaction utilisateurNONE
Publie11/11/2025
Derniere modification11/24/2025
Sourcenvd
Observations honeypot0
Produits affectes
axis:a1210_\(-b\)axis:a1214axis:a1601axis:a1610_\(-b\)axis:a1710-baxis:a1810-baxis:a8207-ve_mk_iiaxis:axis_osaxis:c1110-eaxis:c1111-eaxis:c1210-eaxis:c1211-eaxis:c1310-e_mk_iiaxis:c1410_mk_iiaxis:c1510axis:c1511axis:c1610-veaxis:c1710axis:c1720axis:c6110axis:c8110axis:c8210axis:d1110axis:d201-s_xpt_q6075axis:d2110-veaxis:d2210-veaxis:d3110_mk_iiaxis:d4100-ve_mk_iiaxis:d4200-veaxis:d6310axis:excam_xf_q1785axis:excam_xpt_q6075axis:f9104-b_main_unitaxis:f9104-b_mk_ii_main_unitaxis:f9111-r_mk_ii_main_unitaxis:f9111_main_unitaxis:f9111_mk_ii_main_unitaxis:f9114-b-r_mk_ii_main_unitaxis:f9114-b_main_unitaxis:f9114-btaxis:f9114_main_unitaxis:fa51axis:fa51-baxis:fa54axis:i7010-safetyaxis:i7010-veaxis:i7020axis:i8016-lveaxis:i8116-eaxis:i8307-veaxis:m1055-laxis:m1075-laxis:m1135axis:m1135-e_mk_iiaxis:m1137axis:m1137-e_mk_iiaxis:m2035-leaxis:m2036-leaxis:m3057-plr_mk_iiaxis:m3085-vaxis:m3086-vaxis:m3086-v_micaxis:m3088-vaxis:m3125-lveaxis:m3126-lveaxis:m3128-lveaxis:m3215-lveaxis:m3216-lveaxis:m3905-raxis:m4215-lvaxis:m4215-vaxis:m4216-lvaxis:m4216-vaxis:m4218-lvaxis:m4218-vaxis:m4225-lveaxis:m4227-lveaxis:m4228-lveaxis:m4308-pleaxis:m4317-plraxis:m4317-plveaxis:m4318-plraxis:m4318-plveaxis:m4327-paxis:m4328-paxis:m5000axis:m5000-gaxis:m5074axis:m5075axis:m5075-gaxis:m5526-eaxis:m7104axis:m7116axis:p1245_mk_iiaxis:p1265_mk_iiaxis:p1275_mk_iiaxis:p1385axis:p1385-baxis:p1385-beaxis:p1385-eaxis:p1387axis:p1387-baxis:p1387-beaxis:p1387-leaxis:p1388axis:p1388-baxis:p1388-beaxis:p1388-leaxis:p1465-leaxis:p1465-le-3axis:p1467-leaxis:p1468-leaxis:p1468-xleaxis:p1475-leaxis:p1518-eaxis:p1518-leaxis:p3265-lvaxis:p3265-lveaxis:p3265-lve-3axis:p3265-vaxis:p3267-lvaxis:p3267-lveaxis:p3267-lve_micaxis:p3268-lvaxis:p3268-lveaxis:p3268-slveaxis:p3275-lvaxis:p3275-lveaxis:p3277-lvaxis:p3277-lveaxis:p3278-lvaxis:p3278-lveaxis:p3285-lvaxis:p3285-lveaxis:p3287-lvaxis:p3287-lveaxis:p3288-lvaxis:p3288-lveaxis:p3735-pleaxis:p3737-pleaxis:p3738-pleaxis:p3747-plveaxis:p3748-plveaxis:p3818-pveaxis:p3827-pveaxis:p3905-r_mk_iiiaxis:p3925-lreaxis:p3925-raxis:p3935-lraxis:p4705-plveaxis:p4707-plveaxis:p4708-plveaxis:p5654-eaxis:p5654-e_mk_iiaxis:p5655-eaxis:p5676-leaxis:p7304axis:p7316axis:p9117-pvaxis:q1615-le_mk_iiiaxis:q1615_mk_iiiaxis:q1656axis:q1656-baxis:q1656-beaxis:q1656-bleaxis:q1656-dleaxis:q1656-leaxis:q1686-dleaxis:q1715axis:q1728axis:q1728-leaxis:q1798-leaxis:q1800-leaxis:q1800-le-3axis:q1805-leaxis:q1806-leaxis:q1808-leaxis:q1809-leaxis:q1961-teaxis:q1961-xteaxis:q1971-eaxis:q1972-eaxis:q2101-teaxis:q2111-eaxis:q2112-eaxis:q3536-lveaxis:q3538-lveaxis:q3538-slveaxis:q3546-lveaxis:q3548-lveaxis:q3556-lveaxis:q3558-lveaxis:q3626-veaxis:q3628-veaxis:q3819-pveaxis:q3839-pveaxis:q3839-spveaxis:q4809-pveaxis:q6020-eaxis:q6074axis:q6074-eaxis:q6075axis:q6075-eaxis:q6075-saxis:q6075-seaxis:q6078-eaxis:q6135-leaxis:q6225-leaxis:q6300-eaxis:q6315-leaxis:q6318-leaxis:q6355-leaxis:q6358-leaxis:q8615-eaxis:q8752-eaxis:q8752-e_mk_iiaxis:q9307-lvaxis:s3008axis:s3008_mk_iiaxis:s3016axis:s4000axis:v5925axis:v5938axis:w100axis:w101axis:w102axis:w110axis:w120axis:w401axis:xc1311axis:xf40-q1785axis:xfq1656axis:xpq1785
Faiblesses (CWE)
CWE-214
References
https://www.axis.com/dam/public/39/ba/8b/cve-2025-5452pdf-en-US-504212.pdf(product-security@axis.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.