CVE-2025-0358

8.8 HIGH

📋 TL;DR

This vulnerability in Axis Communications' VAPIX Device Configuration framework allows lower-privileged users to escalate their privileges to administrator level. It affects Axis network video products using VAPIX API. Attackers with existing low-privilege access can gain full control of affected devices.

💻 Affected Systems

Products:
  • Axis network video products with VAPIX API
Versions: Specific versions not detailed in public advisory; consult Axis security bulletin for exact affected versions
Operating Systems: Embedded Linux-based firmware on Axis devices
Default Config Vulnerable: ⚠️ Yes
Notes: Requires existing low-privilege user access to exploit; affects devices with VAPIX interface enabled

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to reconfigure security settings, disable cameras, exfiltrate video footage, or use devices as network pivots.

🟠

Likely Case

Unauthorized administrative access to surveillance systems, enabling camera manipulation, footage deletion, or system reconfiguration.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent low-privilege user access to vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing authenticated low-privilege access; detailed technical information available in Axis advisory

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Axis security advisory for specific firmware versions

Vendor Advisory: https://www.axis.com/dam/public/35/90/85/cve-2025-0358pdf-en-US-483809.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from Axis support portal. 2. Backup device configuration. 3. Apply firmware update via web interface or AXIS Device Manager. 4. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Disable VAPIX API

all

Disable VAPIX interface if not required for functionality

Navigate to device web interface > System Options > Advanced > Plain Config > Disable VAPIX

Restrict Network Access

all

Limit access to VAPIX interface to trusted networks only

Configure firewall rules to restrict access to port 80/443 on Axis devices

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Axis devices from untrusted networks
  • Enforce strong authentication and limit low-privilege user accounts

🔍 How to Verify

Check if Vulnerable:

Check firmware version against Axis security advisory; test with low-privilege account attempting privilege escalation

Check Version:

Access device web interface > System Options > Support > System Overview to view firmware version

Verify Fix Applied:

Verify firmware version is updated to patched version; test privilege escalation attempt fails

📡 Detection & Monitoring

Log Indicators:

  • Multiple privilege escalation attempts in system logs
  • Unauthorized configuration changes by low-privilege users

Network Indicators:

  • Unusual VAPIX API calls from low-privilege accounts
  • Administrative actions from non-admin IP addresses

SIEM Query:

source="axis_device" AND (event_type="privilege_escalation" OR user_role_change="admin")

🔗 References

📤 Share & Export