CVE-2025-8108

6.7 MEDIUM

📋 TL;DR

This CVE describes a privilege escalation vulnerability in Axis devices where improper permissions and lack of input validation in ACAP configuration files could allow attackers to gain elevated privileges. The vulnerability requires victims to install malicious unsigned ACAP applications on devices configured to allow such installations. This affects Axis device users who have enabled unsigned ACAP application installation.

💻 Affected Systems

Products:
  • Axis devices with ACAP capability
Versions: All versions prior to patched firmware
Operating Systems: Axis device firmware
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when configured to allow installation of unsigned ACAP applications. Default configuration typically restricts to signed applications only.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise with root/system-level access, allowing attackers to install persistent backdoors, exfiltrate data, or pivot to other network resources.

🟠

Likely Case

Local privilege escalation to gain administrative control over the affected Axis device, potentially enabling surveillance manipulation or denial of service.

🟢

If Mitigated

No impact if devices are configured to only allow signed ACAP applications or if ACAP application installation is disabled.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to convince victims to install malicious ACAP applications and requires devices to be configured to allow unsigned applications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Axis security advisory for specific firmware versions

Vendor Advisory: https://www.axis.com/dam/public/38/20/aa/cve-2025-8108pdf-en-US-504218.pdf

Restart Required: Yes

Instructions:

1. Download latest firmware from Axis support portal. 2. Backup device configuration. 3. Apply firmware update via web interface or management tool. 4. Verify successful update and restore configuration if needed.

🔧 Temporary Workarounds

Disable unsigned ACAP applications

all

Configure devices to only allow installation of signed ACAP applications

Restrict ACAP installation permissions

all

Limit who can install ACAP applications through access controls

🧯 If You Can't Patch

  • Configure devices to only accept signed ACAP applications from trusted sources
  • Implement network segmentation to isolate Axis devices from critical network segments

🔍 How to Verify

Check if Vulnerable:

Check device configuration for ACAP installation settings and verify if unsigned applications are allowed

Check Version:

Check device web interface or use Axis Device Manager to view firmware version

Verify Fix Applied:

Verify firmware version matches patched version from Axis advisory and test that unsigned ACAP applications cannot be installed

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized ACAP application installation attempts
  • Privilege escalation attempts in system logs
  • Unexpected process execution with elevated privileges

Network Indicators:

  • Unusual outbound connections from Axis devices
  • ACAP package downloads from untrusted sources

SIEM Query:

source="axis_device" AND (event="acap_install" OR event="privilege_escalation")

🔗 References

📤 Share & Export