ACAP applications can be executed with elevated privileges, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
References
| Link | Resource |
|---|---|
| https://www.axis.com/dam/public/ae/19/16/cve-2025-3892pdf-en-US-492760.pdf | Vendor Advisory |
Configurations
History
13 Jan 2026, 18:56
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:* | |
| References | () https://www.axis.com/dam/public/ae/19/16/cve-2025-3892pdf-en-US-492760.pdf - Vendor Advisory | |
| First Time |
Axis axis Os
Axis |
12 Aug 2025, 14:25
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
12 Aug 2025, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-12 06:15
Updated : 2026-01-13 18:56
NVD link : CVE-2025-3892
Mitre link : CVE-2025-3892
CVE.ORG link : CVE-2025-3892
JSON object : View
Products Affected
axis
- axis_os
CWE
CWE-250
Execution with Unnecessary Privileges
