A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAPĀ application.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Axis
Axis axis Os |
|
| Vendors & Products |
Axis
Axis axis Os |
Tue, 11 Nov 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAPĀ application. | |
| Weaknesses | CWE-214 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Axis
Published: 2025-11-11T07:00:46.077Z
Updated: 2025-11-12T04:57:45.909Z
Reserved: 2025-06-02T08:00:32.844Z
Link: CVE-2025-5452
No data.
Status : Awaiting Analysis
Published: 2025-11-11T07:15:34.683
Modified: 2025-11-12T16:19:34.210
Link: CVE-2025-5452
No data.