CVE-2025-3892
📋 TL;DR
CVE-2025-3892 is a privilege escalation vulnerability in Axis devices that allows ACAP applications to execute with elevated privileges. This affects Axis device users who have enabled installation of unsigned ACAP applications. An attacker must convince a victim to install a malicious ACAP application to exploit this vulnerability.
💻 Affected Systems
- Axis devices supporting ACAP applications
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full device compromise with root/system-level access, allowing complete control over the Axis device, data exfiltration, and persistence.
Likely Case
Limited privilege escalation within the device's application environment, potentially allowing access to restricted functions or data.
If Mitigated
No impact if unsigned ACAP applications are blocked or if users only install trusted applications from verified sources.
🎯 Exploit Status
Requires social engineering to convince victim to install malicious ACAP application
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Axis security advisory for specific firmware versions
Vendor Advisory: https://www.axis.com/dam/public/ae/19/16/cve-2025-3892pdf-en-US-492760.pdf
Restart Required: No
Instructions:
1. Download latest firmware from Axis website. 2. Upload firmware to device via web interface. 3. Apply firmware update. 4. Verify update completed successfully.
🔧 Temporary Workarounds
Disable unsigned ACAP applications
allConfigure device to only allow signed ACAP applications from trusted sources
🧯 If You Can't Patch
- Configure device to block all ACAP application installations
- Implement network segmentation to isolate vulnerable devices
🔍 How to Verify
Check if Vulnerable:
Check device configuration for ACAP application installation settings and verify if unsigned applications are allowed
Check Version:
Check device web interface or use Axis device management tools
Verify Fix Applied:
Verify firmware version matches patched version from Axis advisory and confirm unsigned ACAP applications are blocked
📡 Detection & Monitoring
Log Indicators:
- Unauthorized ACAP application installation attempts
- Privilege escalation attempts in system logs
Network Indicators:
- Unexpected outbound connections from Axis devices
- Unusual network traffic patterns
SIEM Query:
source="axis_device" AND (event="acap_install" OR event="privilege_escalation")