🔐 CVE Alert

CVE-2026-1185

MEDIUM 5.4
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th

A configuration file on the local file system had improper input validation which could allow code execution and potentially lead to privilege escalation. This vulnerability can only be exploited if an attacker can log in to the Axis device using SSH.

CWE CWE-732
Vendor axis communications ab
Product axis os
Published May 12, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for axis communications ab axis os

Be the first to know when new medium vulnerabilities affecting axis communications ab axis os are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low

Affected Versions

Axis Communications AB / AXIS OS
12.0.0 < 12.10.36

References

NVD ↗ CVE.org ↗ EPSS Data ↗
axis.com: https://www.axis.com/dam/public/69/df/8d/cve-2026-1185pdf-en-US-530733.pdf

Credits

Cookiejack15