CVE-2025-5452

Published Nov 11, 2025

Last updated 4 months ago

Overview

Description
A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
Source
product-security@axis.com
NVD status
Analyzed
Products
axis_os

Risk scores

CVSS 3.1

Type
Primary
Base score
6.6
Impact score
5.9
Exploitability score
0.7
Vector string
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity
MEDIUM

Weaknesses

product-security@axis.com
CWE-214

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.