CVE-2025-7622

5.7 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability that allows authenticated attackers to make the server send requests to internal resources. This could lead to unauthorized access to internal systems or data. The vulnerability affects Axis Communications products with specific firmware versions.

💻 Affected Systems

Products:
  • Axis Communications products
Versions: Specific firmware versions mentioned in Axis advisory
Operating Systems: Embedded Linux systems on Axis devices
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. Exact affected products and versions detailed in Axis advisory PDF.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains access to sensitive internal systems, extracts credentials, or performs lateral movement within the network.

🟠

Likely Case

Attacker accesses internal web services, metadata services, or configuration interfaces that shouldn't be externally accessible.

🟢

If Mitigated

Limited impact due to network segmentation, proper authentication controls, and restricted internal services.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access. Exploitation involves crafting malicious requests to trigger internal resource access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Axis advisory for specific patched firmware versions

Vendor Advisory: https://www.axis.com/dam/public/c5/9a/3c/cve-2025-7622pdf-en-US-492761.pdf

Restart Required: No

Instructions:

1. Download latest firmware from Axis website. 2. Upload firmware to affected device via web interface. 3. Apply firmware update following Axis documentation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict device network access to prevent reaching internal resources

Authentication Hardening

all

Implement strong authentication and limit user privileges

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices
  • Monitor for unusual outbound requests from affected devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against affected versions in Axis advisory

Check Version:

Check device web interface or use Axis device management tools

Verify Fix Applied:

Verify firmware version has been updated to patched version

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from device
  • Requests to internal IP ranges or metadata services

Network Indicators:

  • Device making requests to internal network segments
  • Unexpected traffic patterns from surveillance devices

SIEM Query:

source_ip="device_ip" AND (dest_ip="169.254.169.254" OR dest_ip="10.*" OR dest_ip="192.168.*" OR dest_ip="172.16-31.*")

🔗 References

📤 Share & Export