CVE-2025-5452

Source
https://cve.org/CVERecord?id=CVE-2025-5452
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-5452.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-5452
Published
2025-11-11T07:15:34.683Z
Modified
2026-03-13T03:33:17.924138Z
Severity
  • 6.6 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A malicious ACAP application can gain access to admin-level service account credentials used by legitimate ACAP applications, leading to potential privilege escalation of the malicious ACAP application. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAPĀ application.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "12.0.0"
            },
            {
                "fixed": "12.6.69"
            }
        ]
    }
]
source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-5452.json"