Article Details

Scrape Timestamp (UTC): 2025-08-07 13:14:13.034

Source: https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html

Original Article Text

Click to Toggle View

6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits. Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications that, if successfully exploited, could expose them to takeover attacks. "The attack results in pre-authentication remote code execution on Axis Device Manager, a server used to configure and manage fleets of cameras, and the Axis Camera Station, client software used to view camera feeds," Claroty researcher Noam Moshe said. "Furthermore, using internet scans of exposed Axis.Remoting services, an attacker can enumerate vulnerable servers and clients, and carry out granular, highly targeted attacks." The list of identified flaws is below - Successful exploitation of the aforementioned vulnerabilities could allow an attacker to assume an AitM position between the Camera Station and its clients, effectively making it possible to alter requests/responses and execute arbitrary actions on either the server or client systems. There is no evidence that the issues have been exploited in the wild. Claroty said it found more than 6,500 servers that expose the proprietary Axis.Remoting protocol and its services over the internet, out of which nearly 4,000 of them are located in the U.S. "Successful exploits give attackers system-level access on the internal network and the ability to control each of the cameras within a specific deployment," Moshe noted. "Feeds can be hijacked, watched, and/or shut down. Attackers can exploit these security issues to bypass authentication to the cameras and gain pre-authentication remote code execution on the devices."

Daily Brief Summary

VULNERABILITIES // Axis Communications Surveillance Systems Exposed to Remote Code Exploits

Cybersecurity researchers identified multiple vulnerabilities in Axis Communications' video surveillance products, potentially allowing unauthorized remote code execution and system takeover.

Over 6,500 Axis servers are exposed to the internet, with nearly 4,000 located in the U.S., posing significant security risks.

Exploitation of these flaws could enable attackers to hijack video feeds, alter communications, and execute arbitrary actions on affected systems.

The vulnerabilities allow attackers to assume a man-in-the-middle position, bypassing authentication and gaining system-level access to camera networks.

No evidence currently indicates these vulnerabilities have been exploited in the wild, but the potential impact is severe.

Organizations using Axis products should prioritize patching and securing exposed servers to mitigate these risks.

This incident underscores the critical need for robust security measures in internet-connected surveillance systems.