#BHUSA: Researchers Identify Major Vulnerabilities in Axis CCTV Software

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

Numerous organizations may be at risk following the revelation of four significant vulnerabilities in the products manufactured by Axis Communications, a prominent provider of CCTV cameras and surveillance technology.

Security firm Claroty, along with its research wing, Team82, unveiled these critical findings during the Black Hat USA conference in Las Vegas on August 6.

Inherent Flaws in Proprietary Communication Protocol

The vulnerabilities, identified by Team82 researcher Noam Moshe, stem from a fundamental defect within Axis. Remoting, a proprietary protocol governing communication between client applications and Axis’s servers.

Upon their discovery, Team82 promptly informed Axis Communications, which subsequently made the vulnerabilities public—an action facilitated by their status as a certified Common Vulnerabilities and Exposures (CVE) Numbering Authority (CNA).

The vulnerabilities are catalogued as follows:

  • CVE-2025-30023: A critical issue (CVSS score: 9) impacting Axis Camera Station Pro prior to version 6.9, Axis Camera Station prior to version 5.58, and Axis Device Manager prior to version 5.32, potentially enabling an authenticated user to execute a remote code execution (RCE) attack.
  • CVE-2025-30024: A medium-severity flaw (CVSS score: 6.8) was found in Axis Device Manager before version 5.32; this could be exploited to conduct a man-in-the-middle (MitM) attack.
  • CVE-2025-30025: A medium-severity issue (CVSS score: 4.8) affecting Axis Camera Station version 5, Axis Camera Station Pro prior to version 6.7, and Axis Device Manager before version 5.32, potentially leading to local privilege escalation.
  • CVE-2025-30026: A medium-severity vulnerability (CVSS score: 5.3) impacting Axis Camera Station prior to version 5.58 and Axis Camera Station Pro before version 6.9, which could facilitate an authentication bypass attack.

Axis Communications stated that to date, no incidents of these vulnerabilities being exploited in real-world scenarios have been documented.

Moreover, the company has released remedial patches incorporated into the following software updates:

  • Axis Camera Station Pro 6.9
  • Axis Camera Station 5.58
  • Axis Device Manager 5.32

In spite of this public discourse, the CVE entries remain under the ‘Reserved’ status on the CVE program website, indicating that further information is expected post-Team82’s presentation at Black Hat on August 6.

On the U.S. National Vulnerability Database (NVD) website, these vulnerabilities are recorded as ‘Awaiting Analysis,’ suggesting that the NVD team has yet to enrich the data available concerning these issues.

6,500 Axis Communications Servers Vulnerable

Despite the absence of confirmed exploitation cases, researchers at Team82 uncovered over 6,500 servers exposing this protocol to the internet, with close to 4,000 of these located in the United States. This finding emerged from an internet scan conducted using tools such as Censys and Shodan.

“Each of these servers might manage hundreds or even thousands of cameras. Given the current constraints on Chinese technology globally, the selection of vendors is increasingly restricted, thereby heightening the importance of securing platforms available for deployment,” noted the researchers.

Team82 has crafted an exploit chain to target vulnerabilities within the Axis. Remoting communication protocol.

Their findings suggest that successful exploitation would grant unauthorized access to both the centralized Axis Device Manager and the Axis Camera Station.

In the event of a successful breach, an attacker could infiltrate the internal network and execute code remotely on either server or client systems.

Furthermore, Team82 emphasized that an attacker acting as a MitM could utilize a pass-the-request flaw in the protocol, which may allow for decryption of traffic and potential remote code execution.

They additionally cautioned that scanning the internet for exposed Axis. Remoting services could empower attackers to identify vulnerable servers and clients, enabling precise and methodical attacks.

“Team82 acknowledges Axis Communications’ prompt response to our findings. They have accepted our disclosure report and worked diligently on necessary patches and updates,” the report stated.

Source link: Infosecurity-magazine.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading