2025-07-11
[email protected]
6.8
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Lifecycle Timeline
3
Analysis Generated
Mar 16, 2026 - 08:17 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 08:17 euvd
EUVD-2025-21111
CVE Published
Jul 11, 2025 - 06:15 nvd
MEDIUM 6.8
Description
The communication protocol used between client and server had a flaw that could be leveraged to execute a man in the middle attack.
Analysis
The communication protocol used between client and server had a flaw that could be leveraged to execute a man in the middle attack.
Technical Context
This vulnerability is classified as Improper Certificate Validation (CWE-295).
Affected Products
Affected products: Axis Device Manager
Remediation
Monitor vendor advisories for patches. Apply mitigations such as network segmentation, access restrictions, and monitoring.
Priority Score
34
Low
Medium
High
Critical
KEV: 0
EPSS: +0.0
CVSS: +34
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-21111