CVE-2025-5452

6.6 MEDIUM

📋 TL;DR

This vulnerability allows malicious ACAP applications to steal admin-level service account credentials from legitimate ACAP applications on Axis devices, potentially enabling privilege escalation. It affects Axis devices configured to allow installation of unsigned ACAP applications. Attackers must convince victims to install their malicious application to exploit this flaw.

💻 Affected Systems

Products:
  • Axis network cameras and video encoders with ACAP support
Versions: All versions prior to patched firmware
Operating Systems: Axis proprietary OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured to allow installation of unsigned ACAP applications. Default configuration typically restricts to signed applications only.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Axis device with administrative privileges, allowing attackers to disable security controls, install persistent backdoors, or pivot to other network systems.

🟠

Likely Case

Malicious ACAP application gains elevated privileges to access sensitive device functions, modify configurations, or exfiltrate data from the device.

🟢

If Mitigated

No impact if devices are configured to only allow signed ACAP applications, as the vulnerability cannot be exploited without unsigned application installation.

🌐 Internet-Facing: MEDIUM - Requires user interaction (installing malicious app) but internet-facing devices are more likely to be targeted.
🏢 Internal Only: LOW - Requires physical or network access plus social engineering to convince users to install malicious applications.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to convince users to install malicious ACAP application and device configuration allowing unsigned applications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Axis security advisory for specific firmware versions

Vendor Advisory: https://www.axis.com/dam/public/39/ba/8b/cve-2025-5452pdf-en-US-504212.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from Axis website. 2. Backup device configuration. 3. Upload firmware via web interface. 4. Apply firmware update. 5. Reboot device. 6. Restore configuration if needed.

🔧 Temporary Workarounds

Disable Unsigned ACAP Applications

all

Configure device to only allow installation of signed ACAP applications

Configure via Axis device web interface: Settings > System > Applications > Only allow signed applications

🧯 If You Can't Patch

  • Configure devices to only allow signed ACAP applications
  • Implement network segmentation to isolate Axis devices from critical systems

🔍 How to Verify

Check if Vulnerable:

Check if device allows unsigned ACAP applications in web interface settings

Check Version:

Check via web interface: Settings > System > Overview > Firmware version

Verify Fix Applied:

Verify firmware version matches patched version from Axis advisory and confirm unsigned ACAP applications are disabled

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized ACAP application installations
  • Unusual service account credential access attempts

Network Indicators:

  • Unexpected outbound connections from Axis devices
  • Unusual ACAP application communication patterns

SIEM Query:

source="axis_device" AND (event="application_install" OR event="credential_access")

🔗 References

📤 Share & Export