During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods within the framework.
Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
References
| Link | Resource |
|---|---|
| https://www.axis.com/dam/public/68/08/c5/cve-2025-0359pdf-en-US-466885.pdf | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
22 Jan 2026, 21:01
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.axis.com/dam/public/68/08/c5/cve-2025-0359pdf-en-US-466885.pdf - Vendor Advisory | |
| First Time |
Axis axis Os
Axis axis Os 2024 Axis |
|
| CPE | cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:* cpe:2.3:o:axis:axis_os_2024:*:*:*:*:lts:*:*:* |
|
| Summary |
|
04 Mar 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-04 06:15
Updated : 2026-01-22 21:01
NVD link : CVE-2025-0359
Mitre link : CVE-2025-0359
CVE.ORG link : CVE-2025-0359
JSON object : View
Products Affected
axis
- axis_os_2024
- axis_os
CWE
CWE-863
Incorrect Authorization
