CVE-2025-10224

5.4 MEDIUM

📋 TL;DR

This vulnerability in AxxonSoft Axxon One (C-Werk) allows authenticated remote attackers to bypass proper LDAP group membership evaluation during login. Attackers can be denied legitimate access or assigned incorrect roles. Affects AxxonSoft Axxon One (C-Werk) 2.0.2 and earlier on Windows systems.

💻 Affected Systems

Products:
  • AxxonSoft Axxon One (C-Werk)
Versions: 2.0.2 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using LDAP authentication with nested group memberships.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged users could be locked out of critical systems while unauthorized users gain elevated access to sensitive surveillance/security data.

🟠

Likely Case

Authentication confusion leading to incorrect role assignments, potentially allowing users to access functions they shouldn't have or being denied access to legitimate functions.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to authentication anomalies that can be detected and corrected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated LDAP user access and knowledge of nested group structures.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version

Vendor Advisory: https://www.axxonsoft.com/legal/axxonsoft-vulnerability-disclosure-policy/security-advisories

Restart Required: No

Instructions:

1. Check vendor advisory for latest patched version. 2. Backup current configuration. 3. Apply vendor-provided patch or upgrade to fixed version. 4. Test LDAP authentication with nested groups.

🔧 Temporary Workarounds

Disable nested LDAP group evaluation

all

Configure LDAP authentication to use only direct group memberships instead of nested group evaluation

Use local authentication temporarily

all

Switch to local user accounts instead of LDAP authentication until patch is applied

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Axxon One systems from general network access
  • Increase monitoring of authentication logs and implement alerts for unusual login patterns

🔍 How to Verify

Check if Vulnerable:

Check Axxon One version in administration interface and verify if using LDAP authentication with nested groups

Check Version:

Check version in Axxon One web interface or administration console

Verify Fix Applied:

Test LDAP authentication with nested group memberships after patch/upgrade to ensure proper role assignment

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts from legitimate users
  • Users logging in with unexpected role assignments
  • LDAP authentication errors related to group resolution

Network Indicators:

  • Unusual authentication patterns to LDAP servers from Axxon One systems

SIEM Query:

source="axxon_one" AND (event_type="auth_failure" OR event_type="role_change")

🔗 References

📤 Share & Export