Axis Communications Ab Axis Os vulnerabilities

48 known vulnerabilities affecting axis_communications_ab/axis_os.

Total CVEs
48
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH14MEDIUM31LOW2

Vulnerabilities

Page 1 of 3
CVE-2025-11142HIGHCVSS 8.8≥ 12.6.54, ≤ 12.7.352026-02-10
CVE-2025-11142 [HIGH] CWE-78 CVE-2025-11142: The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible The VAPIX API mediaclip.cgi that did not have a sufficient input validation allowing for a possible remote code execution. This flaw can only be exploited after authenticating with an operator- or administrator- privileged service account.
cvelistv5nvd
CVE-2025-9524MEDIUMCVSS 4.3≥ 6.50.0, < 6.50.5.21≥ 7.0.0, < 8.40.89+4 more2025-11-11
CVE-2025-9524 [MEDIUM] CWE-1287 CVE-2025-9524: The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes The VAPIX API port.cgi did not have sufficient input validation, which may result in process crashes and impact usability. This vulnerability can only be exploited after authenticating with a viewer- operator- or administrator-privileged service account.
cvelistv5nvd
CVE-2025-6779MEDIUMCVSS 6.7≥ 12.0.0, < 12.6.402025-11-11
CVE-2025-6779 [MEDIUM] CWE-732 CVE-2025-6779: An ACAP configuration file has improper permissions, which could allow command injection and potenti An ACAP configuration file has improper permissions, which could allow command injection and potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
cvelistv5nvd
CVE-2025-8108MEDIUMCVSS 6.7≥ 12.0.0, < 12.7.332025-11-11
CVE-2025-8108 [MEDIUM] CWE-732 CVE-2025-8108: An ACAP configuration file has improper permissions and lacks input validation, which could potentia An ACAP configuration file has improper permissions and lacks input validation, which could potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
cvelistv5nvd
CVE-2025-5454MEDIUMCVSS 6.7≥ 12.0.0, < 12.6.182025-11-11
CVE-2025-5454 [MEDIUM] CWE-35 CVE-2025-5454: An ACAP configuration file lacked sufficient input validation, which could allow a path traversal at An ACAP configuration file lacked sufficient input validation, which could allow a path traversal attack leading to potential privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP applica
cvelistv5nvd
CVE-2025-6571MEDIUMCVSS 6.0≥ 12.0.0, < 12.6.66≥ 11.11.0, < 11.11.1692025-11-11
CVE-2025-6571 [MEDIUM] CWE-522 CVE-2025-6571: A 3rd-party component exposed its password in process arguments, allowing for low-privileged users t A 3rd-party component exposed its password in process arguments, allowing for low-privileged users to access it.
cvelistv5nvd
CVE-2025-5718MEDIUMCVSS 6.8≥ 12.0.0, < 12.6.302025-11-11
CVE-2025-5718 [MEDIUM] CWE-59 CVE-2025-5718: The ACAP Application framework could allow privilege escalation through a symlink attack. This vulne The ACAP Application framework could allow privilege escalation through a symlink attack. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
cvelistv5nvd
CVE-2025-6298MEDIUMCVSS 6.7≥ 12.0.0, < 12.6.282025-11-11
CVE-2025-6298 [MEDIUM] CWE-1287 CVE-2025-6298: ACAP applications can gain elevated privileges due to improper input validation, potentially leading ACAP applications can gain elevated privileges due to improper input validation, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
cvelistv5nvd
CVE-2025-4645MEDIUMCVSS 6.7≥ 12.0.0., < 12.6.72025-11-11
CVE-2025-4645 [MEDIUM] CWE-1287 CVE-2025-4645: An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code execution. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
cvelistv5nvd
CVE-2025-5452MEDIUMCVSS 6.6≥ 12.0.0, < 12.6.692025-11-11
CVE-2025-5452 [MEDIUM] CWE-214 CVE-2025-5452: A malicious ACAP application can gain access to admin-level service account credentials used by legi A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker
cvelistv5nvd
CVE-2025-9055MEDIUMCVSS 6.4≥ 12.0.0, < 12.7.312025-11-11
CVE-2025-9055 [MEDIUM] CWE-250 CVE-2025-9055: The VAPIX Edge storage API that allowed a privilege escalation, enabling a VAPIX administrator-privi The VAPIX Edge storage API that allowed a privilege escalation, enabling a VAPIX administrator-privileged user to gain Linux Root privileges. This flaw can only be exploited after authenticating with an administrator-privileged service account.
cvelistv5nvd
CVE-2025-8998LOWCVSS 3.1≥ 6.50.0, < 6.50.5.22≥ 7.0.0, < 8.40.90+4 more2025-11-11
CVE-2025-8998 [LOW] CWE-73 CVE-2025-8998: It was possible to upload files with a specific name to a temporary directory, which may result in p It was possible to upload files with a specific name to a temporary directory, which may result in process crashes and impact usability. This flaw can only be exploited after authenticating with an operator- or administrator-privileged service account.
cvelistv5nvd
CVE-2025-3892MEDIUMCVSS 6.7≥ 12.0.0, < 12.5.312025-08-12
CVE-2025-3892 [MEDIUM] CWE-250 CVE-2025-3892: ACAP applications can be executed with elevated privileges, potentially leading to privilege escalat ACAP applications can be executed with elevated privileges, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
cvelistv5nvd
CVE-2025-30027MEDIUMCVSS 6.7≥ 12.0.0, < 12.3.362025-08-12
CVE-2025-30027 [MEDIUM] CWE-1287 CVE-2025-30027: An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code execution. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
cvelistv5nvd
CVE-2025-0358HIGHCVSS 8.8≥ 12.0.0, < 12.4.02025-06-02
CVE-2025-0358 [HIGH] CWE-269 CVE-2025-0358: During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a fl During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges.
cvelistv5nvd
CVE-2025-0324HIGHCVSS 8.8≥ 11.8.0, < 11.11.140≥ 12.0.0, < 12.3.332025-06-02
CVE-2025-0324 [HIGH] CWE-791 CVE-2025-0324: The VAPIX Device Configuration framework allowed a privilege escalation, enabling a lower-privileged The VAPIX Device Configuration framework allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges.
cvelistv5nvd
CVE-2025-0325MEDIUMCVSS 4.3≥ 6.50.0, < 6.50.5.21≥ 7.0.0, < 8.40.74+4 more2025-06-02
CVE-2025-0325 [MEDIUM] CWE-628 CVE-2025-0325: A Guard Tour VAPIX API parameter allowed the use of arbitrary values and can be incorrectly called, A Guard Tour VAPIX API parameter allowed the use of arbitrary values and can be incorrectly called, allowing an attacker to block access to the guard tour configuration page in the web interface of the Axis device.
cvelistv5nvd
CVE-2025-0361MEDIUMCVSS 5.3≥ 11.11.0, < 11.11.141≥ 12.0.0, < 12.3.562025-04-08
CVE-2025-0361 [MEDIUM] CWE-203 CVE-2025-0361: During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a f During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Management API.
cvelistv5nvd
CVE-2024-47261MEDIUMCVSS 4.3≥ 10.12.0, < 10.12.276≥ 11.0.0, < 11.11.141+1 more2025-04-08
CVE-2024-47261 [MEDIUM] CWE-1287 CVE-2024-47261: 51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage 51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of the Axis device.
cvelistv5nvd
CVE-2024-47259HIGHCVSS 7.1≥ 11.11.0, < 11.11.126≥ 12.0.0, < 12.2.522025-03-04
CVE-2024-47259 [HIGH] CWE-434 CVE-2024-47259: Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files to the Axis device with the purpose to exhaust system resources. Axis has released patched AXIS OS versions for the highlig
cvelistv5nvd