CVE-2025-6298

ACAP applications can gain elevated privileges due to improper input validation, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.
Configurations

Configuration 1 (hide)

cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*

History

21 Jan 2026, 20:06

Type Values Removed Values Added
CPE cpe:2.3:o:axis:axis_os:*:*:*:*:active:*:*:*
First Time Axis axis Os
Axis
References () https://www.axis.com/dam/public/ef/91/c3/cve-2025-6298pdf-en-US-504215.pdf - () https://www.axis.com/dam/public/ef/91/c3/cve-2025-6298pdf-en-US-504215.pdf - Vendor Advisory

11 Nov 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-11 07:15

Updated : 2026-01-21 20:06


NVD link : CVE-2025-6298

Mitre link : CVE-2025-6298

CVE.ORG link : CVE-2025-6298


JSON object : View

Products Affected

axis

  • axis_os
CWE
CWE-1287

Improper Validation of Specified Type of Input