CVE-2025-5454
📋 TL;DR
This CVE describes a path traversal vulnerability in Axis ACAP configuration files that could allow privilege escalation. It affects Axis devices configured to allow unsigned ACAP application installation. Attackers would need to trick users into installing malicious ACAP applications to exploit this vulnerability.
💻 Affected Systems
- Axis network cameras and devices with ACAP support
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with root privileges, allowing complete control over the Axis device and potential lateral movement within the network.
Likely Case
Limited privilege escalation within the ACAP application context, potentially allowing access to restricted files or configuration data.
If Mitigated
No impact if unsigned ACAP applications are blocked or proper input validation is implemented.
🎯 Exploit Status
Requires social engineering to convince victim to install malicious ACAP application. Path traversal occurs after installation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Axis advisory for specific patched firmware versions
Vendor Advisory: https://www.axis.com/dam/public/48/ab/82/cve-2025-5454pdf-en-US-504213.pdf
Restart Required: Yes
Instructions:
1. Download latest firmware from Axis website. 2. Upload firmware to device via web interface. 3. Apply firmware update. 4. Reboot device.
🔧 Temporary Workarounds
Block Unsigned ACAP Applications
allConfigure device to only allow signed ACAP applications
Configure via Axis device web interface: Settings > System > Security > ACAP Application Settings
🧯 If You Can't Patch
- Configure device to block all unsigned ACAP applications
- Implement network segmentation to isolate Axis devices from critical systems
🔍 How to Verify
Check if Vulnerable:
Check ACAP configuration in device web interface to see if unsigned ACAPs are allowed
Check Version:
Check via web interface: Help > About or via SSH: cat /etc/version
Verify Fix Applied:
Verify firmware version matches patched version from Axis advisory and confirm unsigned ACAPs are blocked
📡 Detection & Monitoring
Log Indicators:
- Unauthorized ACAP installation attempts
- Path traversal patterns in ACAP configuration files
Network Indicators:
- Unexpected ACAP package downloads to Axis devices
SIEM Query:
source="axis_device" AND (event="acap_install" OR event="config_modification")