First published: Tue Mar 04 2025(Updated: )
During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level in the VAPIX service account D-Bus API.
Credit: product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Axis Communications VAPIX Device Configuration |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0360 is classified as a high severity vulnerability due to its potential impact on user privilege levels.
To fix CVE-2025-0360, it is recommended to update the Axis VAPIX Device Configuration framework to the latest security patch provided by Axis.
CVE-2025-0360 affects the Axis VAPIX Device Configuration framework.
CVE-2025-0360 identifies a flaw in the VAPIX Device Configuration framework that can lead to incorrect user privilege levels.
Currently, there are no public workarounds for CVE-2025-0360, and users should rely on applying the necessary updates.