First published: Tue Apr 08 2025(Updated: )
During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Management API.
Credit: product-security@axis.com
Affected Software | Affected Version | How to fix |
---|---|---|
Axis Communications VAPIX Device Configuration |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0361 is classified as a medium severity vulnerability due to the potential for unauthenticated username enumeration.
To fix CVE-2025-0361, ensure you update the VAPIX Device Configuration framework to the latest version provided by Axis Communications.
CVE-2025-0361 allows attackers to gain unauthorized information about valid usernames, which could lead to further exploitation.
A potential workaround for CVE-2025-0361 includes restricting access to the SSH Management API to trusted IP addresses only.
CVE-2025-0361 affects the Axis Communications VAPIX Device Configuration framework.