CVE-2025-6298

Source
https://cve.org/CVERecord?id=CVE-2025-6298
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-6298.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-6298
Published
2025-11-11T07:15:35.397Z
Modified
2026-03-13T03:38:14.423097Z
Severity
  • 6.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

ACAP applications can gain elevated privileges due to improper input validation, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-6298.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "12.6.28"
            }
        ]
    }
]