CVE-2025-0359

8.5 HIGH

📋 TL;DR

This vulnerability in Axis Communication's ACAP Application framework allows applications to bypass D-Bus method restrictions, potentially enabling unauthorized access to sensitive system functions. It affects Axis devices running vulnerable AXIS OS versions. The flaw was discovered during a penetration test by Truesec.

💻 Affected Systems

Products:
  • Axis devices with ACAP Application framework
Versions: Specific versions not provided in description; refer to Axis advisory
Operating Systems: AXIS OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires ACAP applications to be present/exploitable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain full control of affected Axis devices, execute arbitrary code, access sensitive data, or disrupt device operations.

🟠

Likely Case

Unauthorized applications could access restricted system functions, potentially leading to privilege escalation, data leakage, or service disruption.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to isolated network segments.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to deploy or manipulate ACAP applications

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Axis security advisory for specific patched versions

Vendor Advisory: https://www.axis.com/dam/public/68/08/c5/cve-2025-0359pdf-en-US-466885.pdf

Restart Required: Yes

Instructions:

1. Review Axis security advisory. 2. Identify affected devices. 3. Download and apply patched AXIS OS version. 4. Restart devices. 5. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Axis devices from untrusted networks and restrict access to necessary services only

ACAP Application Restriction

all

Disable or restrict installation of untrusted ACAP applications

🧯 If You Can't Patch

  • Implement strict network access controls to limit device exposure
  • Disable ACAP framework if not required for operations

🔍 How to Verify

Check if Vulnerable:

Check AXIS OS version against vulnerable versions listed in Axis advisory

Check Version:

Check device web interface or use Axis device management tools

Verify Fix Applied:

Verify AXIS OS version matches patched version from advisory and test D-Bus method restrictions

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized D-Bus method calls
  • Unexpected ACAP application activity
  • Privilege escalation attempts

Network Indicators:

  • Unusual network traffic to/from Axis devices
  • Unexpected D-Bus communication patterns

SIEM Query:

Search for D-Bus method access logs from Axis devices outside normal patterns

🔗 References

📤 Share & Export