CVE-2025-10223

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers (local or remote) to maintain access to the AxxonSoft Axxon One Web Admin Panel even after their privileges have been revoked, by continuing to use unexpired session tokens. It affects Windows installations of Axxon One (C-Werk) versions prior to 2.0.3. Attackers can perform actions with previously granted permissions until the session naturally expires.

💻 Affected Systems

Products:
  • AxxonSoft Axxon One (C-Werk)
Versions: All versions prior to 2.0.3
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Web Admin Panel component. Requires authenticated access (local or remote).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious insider or compromised account maintains administrative access after being demoted or terminated, allowing data theft, system manipulation, or privilege escalation.

🟠

Likely Case

Former employees or contractors retain access to systems they should no longer have permissions for, potentially accessing sensitive surveillance data or configuration settings.

🟢

If Mitigated

With proper session management controls, the window of opportunity is limited to the remaining session duration after privilege removal.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires an authenticated session and knowledge that privileges have been removed. The attacker simply continues using their existing session token.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.3 or later

Vendor Advisory: https://www.axxonsoft.com/legal/axxonsoft-vulnerability-disclosure-policy/security-advisories

Restart Required: No

Instructions:

1. Download Axxon One version 2.0.3 or later from official AxxonSoft sources. 2. Follow standard upgrade procedures for Axxon One installations. 3. Verify the update completed successfully.

🔧 Temporary Workarounds

Manual Session Termination

all

Manually invalidate all active sessions when user privileges are modified or accounts are disabled

No automated commands available - requires administrative action in Axxon One interface

Reduce Session Timeout

all

Configure shorter session timeout values to limit the window of vulnerability

Configure in Axxon One Web Admin Panel settings

🧯 If You Can't Patch

  • Implement strict access review processes and immediately terminate all sessions when modifying user privileges
  • Deploy network segmentation to limit Web Admin Panel access to trusted networks only

🔍 How to Verify

Check if Vulnerable:

Check Axxon One version in Web Admin Panel. If version is below 2.0.3, the system is vulnerable.

Check Version:

Check version in Axxon One Web Admin Panel interface (no specific CLI command provided by vendor)

Verify Fix Applied:

After updating to 2.0.3 or later, test that session tokens are invalidated immediately when user privileges are revoked.

📡 Detection & Monitoring

Log Indicators:

  • User accessing resources after privilege removal timestamps
  • Multiple failed session termination attempts

Network Indicators:

  • Web Admin Panel traffic from users whose accounts were recently modified

SIEM Query:

source="axxon_one" AND (event_type="access_denied" OR user_privilege_change="true") | stats count by user, session_id

🔗 References

📤 Share & Export