CVE-2026-1185
Improper Input Validation in Axis Device Configuration File
Publication date: 2026-05-12
Last updated on: 2026-05-12
Assigner: Axis Communications AB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| axis | axis_os | From 12.0.0 (inc) to 12.10.36 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-732 | The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-1185 is a vulnerability in AXIS OS versions 12.0.0 through 12.10.36 caused by improper input validation in a local configuration file. This flaw could allow an attacker who has SSH access to the device to execute code and potentially escalate their privileges on the system.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker with SSH access to execute arbitrary code on the device and potentially escalate their privileges. This could lead to unauthorized control over the device, impacting its integrity and availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves improper input validation in a local configuration file on Axis devices running AXIS OS versions 12.0.0 through 12.10.36. Detection requires verifying the device software version and checking for unauthorized SSH access.
Since exploitation requires SSH login, monitoring SSH access logs on the device can help detect potential attempts.
To detect if your device is vulnerable, you can check the AXIS OS version by running a command on the device's CLI such as:
- show version
If the version is between 12.0.0 and 12.10.36, the device is vulnerable and should be updated.
Additionally, reviewing SSH login attempts can be done by checking the SSH logs, for example:
- cat /var/log/auth.log | grep ssh
Note that no public exploits are known, so detection focuses on version checking and monitoring SSH access.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the AXIS OS software on your device to version 12.10.37 or later, where the vulnerability has been patched.
Restrict SSH access to trusted users only, and monitor SSH login attempts to prevent unauthorized access.
If updating immediately is not possible, consider disabling SSH access temporarily to reduce the risk of exploitation.
Contact Axis technical support for further assistance and guidance on securing your device.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how this vulnerability affects compliance with common standards and regulations such as GDPR or HIPAA.