CVE-2025-13064

4.5 MEDIUM

📋 TL;DR

This CVE describes a server-side injection vulnerability where a malicious administrator with a tampered client can inject and execute malicious scripts on the server. The attack requires admin privileges and a compromised client, affecting systems where administrators use untrusted or modified client software.

💻 Affected Systems

Products:
  • Axis Camera Station
Versions: Versions prior to 6.18.5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows OS and admin access with tampered client software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise allowing data theft, lateral movement, or persistent backdoor installation via server-side code execution.

🟠

Likely Case

Limited server-side script execution within the application context, potentially leading to data manipulation or unauthorized access to application resources.

🟢

If Mitigated

No impact if proper client integrity checks and admin activity monitoring are in place.

🌐 Internet-Facing: MEDIUM - Requires admin access and tampered client, but internet-facing admin interfaces increase attack surface.
🏢 Internal Only: HIGH - Internal administrators with tampered clients pose significant risk due to existing trust and access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires admin privileges and ability to tamper with client software, making exploitation more complex than typical injection attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.18.5

Vendor Advisory: https://www.axis.com/dam/public/a9/9e/94/cve-2025-13064pdf-en-US-519290.pdf

Restart Required: Yes

Instructions:

1. Download Axis Camera Station version 6.18.5 from Axis portal. 2. Backup current configuration. 3. Run installer and follow upgrade prompts. 4. Restart the server after installation completes.

🔧 Temporary Workarounds

Client Integrity Monitoring

all

Implement client-side integrity checks and monitoring to detect tampered admin clients.

Admin Session Monitoring

all

Enable detailed logging and monitoring of admin activities for suspicious injection patterns.

🧯 If You Can't Patch

  • Restrict admin access to trusted devices only and implement client integrity verification
  • Implement network segmentation to isolate vulnerable systems and monitor all admin traffic

🔍 How to Verify

Check if Vulnerable:

Check Axis Camera Station version in application settings or Windows Programs list. Versions below 6.18.5 are vulnerable.

Check Version:

Check via Axis Camera Station GUI: Help → About, or check Windows installed programs list.

Verify Fix Applied:

Verify version shows 6.18.5 or higher in application settings and test admin functions with monitoring enabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin script execution patterns
  • Unexpected server-side script modifications
  • Admin client integrity check failures

Network Indicators:

  • Suspicious admin client-server communications
  • Unexpected script payloads in admin requests

SIEM Query:

source="axis_camera_station" AND (event_type="admin_action" AND action="script_execution") AND payload_size>normal_threshold

🔗 References

📤 Share & Export