CVE-2025-6298

6.7 MEDIUM

📋 TL;DR

This CVE describes a privilege escalation vulnerability in Axis ACAP applications where improper input validation allows malicious applications to gain elevated privileges. It affects Axis devices configured to allow installation of unsigned ACAP applications. Attackers must convince victims to install a malicious ACAP application to exploit this vulnerability.

💻 Affected Systems

Products:
  • Axis network devices with ACAP application support
Versions: All versions supporting ACAP applications
Operating Systems: Axis device firmware
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured to allow installation of unsigned ACAP applications. Default configuration typically restricts to signed applications only.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with administrative privileges, allowing attackers to modify device configuration, install persistent backdoors, or pivot to other network resources.

🟠

Likely Case

Limited privilege escalation within the ACAP application sandbox, potentially allowing unauthorized access to device functions or data.

🟢

If Mitigated

No impact if devices are configured to only allow signed ACAP applications from trusted sources.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to convince users to install malicious ACAP applications. Requires device configuration that permits unsigned application installation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Axis security advisory for specific firmware versions

Vendor Advisory: https://www.axis.com/dam/public/ef/91/c3/cve-2025-6298pdf-en-US-504215.pdf

Restart Required: Yes

Instructions:

1. Access Axis device web interface
2. Navigate to System > Maintenance
3. Check for firmware updates
4. Download and install latest firmware from Axis website
5. Reboot device after installation

🔧 Temporary Workarounds

Disable unsigned ACAP applications

all

Configure device to only allow signed ACAP applications from trusted sources

Restrict ACAP installation permissions

all

Limit which users can install ACAP applications on the device

🧯 If You Can't Patch

  • Configure devices to only accept signed ACAP applications from trusted sources
  • Implement network segmentation to isolate vulnerable devices from critical resources
  • Educate users about risks of installing untrusted applications

🔍 How to Verify

Check if Vulnerable:

Check device configuration to see if unsigned ACAP applications are allowed. Review installed ACAP applications for unknown or suspicious entries.

Check Version:

Check device web interface under System > Support > System Overview for firmware version

Verify Fix Applied:

Verify firmware version is updated to patched version. Confirm device configuration only allows signed ACAP applications.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized ACAP application installation attempts
  • Privilege escalation attempts in application logs
  • Unexpected process execution with elevated privileges

Network Indicators:

  • Unusual outbound connections from Axis devices
  • ACAP application download from untrusted sources

SIEM Query:

source="axis_device" AND (event="acap_install" OR event="privilege_escalation")

🔗 References

📤 Share & Export