First published: Tue Mar 04 2025(Updated: )
During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods within the framework. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
Credit: product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
AXIS OS | ||
Axis ACAP Application Framework |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0359 is classified as a critical vulnerability due to its potential impact on restricted method access within the ACAP Application framework.
To remediate CVE-2025-0359, upgrade to the patched versions of AXIS OS released by Axis Communication.
CVE-2025-0359 affects Axis AXIS OS and the Axis ACAP Application framework.
There are no recommended workarounds for CVE-2025-0359 other than applying the available patches.
Exploiting CVE-2025-0359 could allow an attacker to access restricted D-Bus methods, potentially compromising the system's integrity.