Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN901
_____________________________________________________________________

DATE                : 23/12/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running AXIS Camera Station Pro,
                       AXIS Camera Station, AXIS Device Manager.

=====================================================================
https://www.cisa.gov/news-events/ics-advisories/icsa-25-352-08
_____________________________________________________________________


ICS Advisory
Axis Communications Camera Station Pro, Camera Station, and Device
Manager

Release Date
December 18, 2025

Alert Code
ICSA-25-352-08

View CSAF


Summary

Successful exploitation of these vulnerabilities could result in an
attacker executing arbitrary code, executing a man-in-middle style attack,
or bypass authentication.

The following versions of Axis Communications Camera Station Pro,
Camera Station, and Device Manager are affected:

    AXIS Camera Station Pro (CVE-2025-30023, CVE-2025-30025, CVE-2025-30026)
    AXIS Camera Station (CVE-2025-30023, CVE-2025-30025, CVE-2025-30026)
    AXIS Device Manager (CVE-2025-30023, CVE-2025-30024, CVE-2025-30025)

CVSS         Vendor         Equipment         Vulnerabilities
v3 9         Axis Communications         Axis Communications Camera Station Pro,
Camera Station, and Device Manager         Deserialization of Untrusted Data,
Improper Certificate Validation, Authentication Bypass Using an Alternate
Path or Channel


Background

    Critical Infrastructure Sectors: Commercial Facilities, Critical
Manufacturing
    Countries/Areas Deployed: Worldwide
    Company Headquarters Location: Sweden


Vulnerabilities

Expand All +
CVE-2025-30023
CVE-2025-30024
CVE-2025-30025
CVE-2025-30026


Acknowledgments

    Noam Moshe of Claroty Team82 reported these vulnerabilities to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification
(https://www.cisa.gov/notification) and this Privacy & Use policy
(https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation
of these vulnerabilities, such as:

Minimize network exposure for all control system devices and/or systems, ensuring
they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating
them from business networks.

When remote access is required, use more secure methods, such as Virtual Private
Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated
to the most current version available. Also recognize VPN is only as secure as
the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment
prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices
on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense
best practices are available for reading and download, including Improving
Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies
for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on
the ICS webpage at cisa.gov/ics in the technical information paper,
ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established
internal procedures and report findings to CISA for tracking and correlation
against other incidents.

No known public exploitation specifically targeting these vulnerabilities has been
reported to CISA at this time.


Revision History

    Initial Release Date: 2025-12-18

Date         Revision         Summary
2025-12-18         1         Initial Publication


Legal Notice and Terms of Use

This product is provided subject to this Notification and this Privacy & Use policy.

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




