CVE-2025-10226

9.8 CRITICAL

📋 TL;DR

This vulnerability in AxxonSoft Axxon One (C-Werk) 2.0.8 and earlier allows remote attackers to exploit multiple known PostgreSQL vulnerabilities to execute arbitrary code, escalate privileges, or cause denial-of-service. The vulnerability affects systems running the vulnerable AxxonSoft software on Windows or Linux platforms. Attackers can exploit this without authentication when the system is network-accessible.

💻 Affected Systems

Products:
  • AxxonSoft Axxon One (C-Werk)
Versions: 2.0.8 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the bundled PostgreSQL v10.x backend are vulnerable. The vulnerability stems from using outdated PostgreSQL components with known security issues.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges leading to complete system compromise, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Privilege escalation to database administrator level, allowing data manipulation, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for service disruption if denial-of-service vulnerabilities are exploited.

🌐 Internet-Facing: HIGH - Remote exploitation possible without authentication when exposed to internet.
🏢 Internal Only: HIGH - Internal attackers or compromised systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploits for the underlying PostgreSQL vulnerabilities are publicly documented and can be adapted. No specific exploit for this AxxonSoft integration has been published yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to PostgreSQL 17.4 or later, and upgrade AxxonSoft software to version that includes this update

Vendor Advisory: https://www.axxonsoft.com/legal/axxonsoft-vulnerability-disclosure-policy/security-advisories

Restart Required: Yes

Instructions:

1. Check current AxxonSoft version. 2. Download latest AxxonSoft update from vendor portal. 3. Backup configuration and database. 4. Install update following vendor instructions. 5. Verify PostgreSQL version is 17.4 or later. 6. Restart services.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to AxxonSoft PostgreSQL port (default 5432) to only trusted hosts

# Linux firewall example
sudo ufw deny from any to any port 5432
# Windows firewall example
New-NetFirewallRule -DisplayName "Block PostgreSQL" -Direction Inbound -LocalPort 5432 -Protocol TCP -Action Block

PostgreSQL Configuration Hardening

all

Modify PostgreSQL configuration to restrict connections and disable unnecessary features

# Edit postgresql.conf
listen_addresses = 'localhost'
# Edit pg_hba.conf
host all all 127.0.0.1/32 md5

🧯 If You Can't Patch

  • Implement strict network access controls to isolate the vulnerable system
  • Deploy intrusion detection systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check AxxonSoft version in web interface or configuration files, and verify PostgreSQL version with 'SELECT version();'

Check Version:

psql -U postgres -c 'SELECT version();'

Verify Fix Applied:

Confirm AxxonSoft version is above 2.0.8 and PostgreSQL version is 17.4 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual PostgreSQL authentication attempts
  • Failed login attempts from unexpected IPs
  • PostgreSQL error logs showing exploitation patterns

Network Indicators:

  • Unusual traffic to PostgreSQL port 5432
  • SQL injection patterns in network traffic
  • Unexpected outbound connections from PostgreSQL process

SIEM Query:

source="postgresql.log" AND ("authentication failure" OR "invalid password" OR "connection reset") | stats count by src_ip

🔗 References

📤 Share & Export