An ACAP configuration file has improper permissions and lacks input validation, which could potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Axis
Axis axis Os |
|
| Vendors & Products |
Axis
Axis axis Os |
Tue, 11 Nov 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An ACAP configuration file has improper permissions and lacks input validation, which could potentially lead to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application. | |
| Weaknesses | CWE-1287 CWE-732 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Axis
Published: 2025-11-11T07:10:31.421Z
Updated: 2025-11-12T04:57:47.920Z
Reserved: 2025-07-24T07:37:55.384Z
Link: CVE-2025-8108
No data.
Status : Awaiting Analysis
Published: 2025-11-11T07:15:36.413
Modified: 2025-11-12T16:19:34.210
Link: CVE-2025-8108
No data.