CVE-2025-10225

7.5 HIGH

📋 TL;DR

A memory buffer vulnerability in AxxonSoft Axxon One's OpenSSL session module allows remote attackers to cause application crashes or unpredictable behavior by exploiting memory reallocation errors under high load conditions. This affects Axxon One (C-Werk) 2.0.6 and earlier on Windows systems. Organizations using these vulnerable versions are at risk of service disruption.

💻 Affected Systems

Products:
  • AxxonSoft Axxon One (C-Werk)
Versions: 2.0.6 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the OpenSSL-based session module. Requires high load conditions to trigger.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage through application crashes, potentially leading to denial of service for security systems and loss of monitoring capabilities.

🟠

Likely Case

Application instability and crashes under targeted high-load attacks, causing intermittent service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and load balancing, though vulnerability remains present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires creating high load conditions to trigger memory reallocation errors. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.7 or later

Vendor Advisory: https://www.axxonsoft.com/legal/axxonsoft-vulnerability-disclosure-policy/security-advisories

Restart Required: Yes

Instructions:

1. Download Axxon One version 2.0.7 or later from vendor portal. 2. Backup current configuration and data. 3. Run installer to upgrade. 4. Restart all Axxon One services. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Implement Rate Limiting

all

Configure network devices or firewalls to limit connection rates to Axxon One services to prevent high load conditions.

Network Segmentation

all

Isolate Axxon One systems from untrusted networks to reduce attack surface.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can communicate with Axxon One services
  • Deploy monitoring and alerting for unusual traffic patterns or high load conditions

🔍 How to Verify

Check if Vulnerable:

Check Axxon One version in administration interface or via 'axxonone --version' command. Versions 2.0.6 and earlier are vulnerable.

Check Version:

axxonone --version

Verify Fix Applied:

Confirm version is 2.0.7 or later and test session handling under simulated load conditions.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs
  • Memory allocation failure messages
  • Session handling errors
  • High CPU/memory usage spikes

Network Indicators:

  • Unusual high-volume traffic to session endpoints
  • Repeated connection attempts
  • Traffic patterns indicating load testing

SIEM Query:

source="axxonone" AND (event_type="crash" OR error="memory" OR error="session")

🔗 References

📤 Share & Export