CVE-2025-10714

8.4 HIGH

📋 TL;DR

CVE-2025-10714 is an unquoted search path vulnerability in AXIS Optimizer software that allows local attackers with administrative privileges to escalate privileges on Windows systems. This affects Windows users who have AXIS Optimizer installed and configured with vulnerable paths. Attackers need local access and write permissions to the installation directory to exploit this.

💻 Affected Systems

Products:
  • AXIS Optimizer
Versions: All versions prior to the patched release
Operating Systems: Microsoft Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations where the software is installed in paths containing spaces without proper quoting.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through privilege escalation to SYSTEM-level access, enabling complete control over the Windows machine.

🟠

Likely Case

Local privilege escalation from a lower-privileged administrative account to higher privileges, potentially enabling persistence or lateral movement.

🟢

If Mitigated

Limited impact due to proper access controls preventing unauthorized local access and strict file permission settings.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the Windows machine and cannot be exploited remotely over the internet.
🏢 Internal Only: MEDIUM - Internal attackers with local access and sufficient privileges could exploit this for privilege escalation within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access, administrative privileges to write to installation directory, and knowledge of unquoted path exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest version as referenced in vendor advisory

Vendor Advisory: https://www.axis.com/dam/public/a2/c7/8c/cve-2025-10714pdf-en-US-504221.pdf

Restart Required: Yes

Instructions:

1. Download the latest AXIS Optimizer version from official vendor sources. 2. Uninstall the current vulnerable version. 3. Install the updated version. 4. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Remove vulnerable installation path

windows

Reinstall AXIS Optimizer in a directory path without spaces or special characters

Uninstall current AXIS Optimizer
Reinstall to a path like C:\AXISOptimizer\

Restrict directory permissions

windows

Set strict ACLs on the AXIS Optimizer installation directory to prevent unauthorized writes

icacls "C:\Program Files\AXIS Optimizer" /deny Users:(OI)(CI)W

🧯 If You Can't Patch

  • Implement strict access controls to limit local administrative access to Windows machines
  • Monitor for suspicious file creation in AXIS Optimizer installation directories

🔍 How to Verify

Check if Vulnerable:

Check if AXIS Optimizer is installed in a directory path containing spaces without proper quoting in Windows service configurations

Check Version:

Check AXIS Optimizer about dialog or installed programs list in Windows Control Panel

Verify Fix Applied:

Verify the installed version matches the patched version from vendor advisory and check service paths are properly quoted

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file creation in AXIS Optimizer installation directories
  • Service path modifications in Windows registry

Network Indicators:

  • No network-based indicators as this is a local privilege escalation

SIEM Query:

Windows Event ID 4688 with process creation in AXIS Optimizer directories OR registry modifications to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\

🔗 References

📤 Share & Export