The 6,500 axis server exposes the remote protocol. 4,000 people in the US are vulnerable to exploitation

3 Min Read
3 Min Read

Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications, which, if successfully exploited, can now take over the attack.

“This attack will have pre-certified remote code execution in Axis Device Manager, servers used to configure and manage camera fleets, and Axis camera stations for client software used to view camera feeds.”

“In addition, using Internet scanning of exposed axes, attackers can enumerate vulnerable servers and clients and carry out granular, highly targeted attacks.”

The list of identified defects is as follows:

  • CVE-2025-30023 (CVSS score: 9.0) – Flaws in the communication protocol used between clients and servers can lead to authenticated users performing remote code execution attacks (fixed with Camera Station Pro 6.9, Camera Station 5.58, and Device Manager 5.32)
  • CVE-2025-30024 (CVSS score: 6.8) – A defect in the communication protocol used between client and server. This can be utilized to carry out intermediate (AITM) attacks (fixed with Device Manager 5.32)
  • CVE-2025-30025 (CVSS score: 4.8) – Flaws in communication protocol used between server processes and service controls that can lead to local privilege escalation (fixed with Camera Station Pro 6.8 and Device Manager 5.32)
  • CVE-2025-30026 (CVSS score: 5.3) – Axis camera station server defects that could lead to authentication bypass (fixed with Camera Station Pro 6.9 and Camera Station 5.58)

The successful exploitation of the aforementioned vulnerability allows an attacker to assume the AITM location between the camera station and its clients, effectively modifying requests/responses and performing any action on either the server or client system. There is no evidence that the problem was exploited in the wild.

Claroty said it found over 6,500 servers that expose their own axis.

See also  The US seizes $7.74 million in crypto tied to North Korea's global fake IT worker network

“A successful exploit gives the attacker system-level access on the internal network and the ability to control each camera in a particular deployment,” Moshe said. “The feed can be hijacked, monitored, and/or shut down. Attackers can take advantage of these security issues to bypass authentication to the camera and obtain remote code execution before authentication on the device.”

Share This Article
Leave a comment