CVE-2025-30027
- EPSS 0.03%
- Published 12.08.2025 05:18:26
- Last modified 12.08.2025 14:25:33
An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code execution. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if a...
CVE-2025-3892
- EPSS 0.02%
- Published 12.08.2025 05:14:43
- Last modified 12.08.2025 14:25:33
ACAP applications can be executed with elevated privileges, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an atta...
CVE-2025-0358
- EPSS 0.02%
- Published 02.06.2025 07:39:50
- Last modified 02.06.2025 17:32:17
During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges.
CVE-2025-0325
- EPSS 0.1%
- Published 02.06.2025 07:36:55
- Last modified 02.06.2025 17:32:17
A Guard Tour VAPIX API parameter allowed the use of arbitrary values and can be incorrectly called, allowing an attacker to block access to the guard tour configuration page in the web interface of the Axis device.
CVE-2025-0324
- EPSS 0.08%
- Published 02.06.2025 07:32:56
- Last modified 02.06.2025 17:32:17
The VAPIX Device Configuration framework allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges.
CVE-2025-0361
- EPSS 0.05%
- Published 08.04.2025 05:38:02
- Last modified 08.04.2025 18:13:53
During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Manag...
CVE-2024-47261
- EPSS 0.08%
- Published 08.04.2025 05:33:58
- Last modified 08.04.2025 18:13:53
51l3nc3, a member of the AXIS OS Bug Bounty Program, has found that the VAPIX API uploadoverlayimage.cgi did not have sufficient input validation to allow an attacker to upload files to block access to create image overlays in the web interface of th...
CVE-2025-0359
- EPSS 0.03%
- Published 04.03.2025 06:15:30
- Last modified 04.03.2025 06:15:30
During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods within the framework. Axis has released patched AXI...
CVE-2025-0360
- EPSS 0.02%
- Published 04.03.2025 06:15:30
- Last modified 04.03.2025 06:15:30
During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level in the VAPIX service account D-Bus API.
CVE-2024-47262
- EPSS 0.14%
- Published 04.03.2025 06:15:29
- Last modified 04.03.2025 06:15:29
Dzmitry Lukyanenka, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API param.cgi was vulnerable to a race condition attack allowing for an attacker to block access to the web interface of the Axis device. Other API endpoints or se...