A Host Header Injection vulnerability in Avigilon ACM v7.10.0.20 allows attackers to execute arbitrary code via supplying a crafted URL.
Description
A Host Header Injection vulnerability in Avigilon ACM v7.10.0.20 allows attackers to execute arbitrary code via supplying a crafted URL.
AI Analyst Comment
Remediation
Update A Host Header Injection vulnerability in Avigilon ACM Multiple Products to the latest version. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability has been identified in Avigilon Access Control Manager (ACM) software that could allow a remote attacker to take complete control of the system. This flaw, resulting from a Host Header Injection, can be exploited by sending a specially crafted URL, enabling the attacker to execute arbitrary code, potentially leading to unauthorized physical access, data theft, and disruption of security operations.
Vulnerability Details
CVE-ID: CVE-2025-56266
Affected Software: Avigilon Access Control Manager (ACM)
Affected Versions: Version 7.10.0.20 is confirmed vulnerable. See vendor advisory for a complete list of specific affected versions and products.
Vulnerability: The vulnerability exists because the Avigilon ACM application improperly validates the
Hostheader in incoming HTTP requests. An unauthenticated remote attacker can exploit this by sending a web request with a malicious, specially craftedHostheader. The application then uses this untrusted input in a way that leads to arbitrary code execution on the server, allowing the attacker to gain full control over the underlying system hosting the ACM software.Business Impact
This vulnerability is rated as critical severity with a CVSS score of 9.8. Successful exploitation could have a severe impact on the organization, leading to a complete compromise of the Avigilon Access Control Manager system. Potential consequences include unauthorized physical access to facilities managed by the ACM, theft of sensitive data, disruption of security operations, and the ability for an attacker to establish a persistent foothold in the corporate network for further attacks. The compromise of a physical access control system represents a significant threat to both digital and physical security.
Remediation Plan
Immediate Action: Immediately apply the security patches provided by the vendor to update Avigilon ACM to the latest, non-vulnerable version. After patching, it is crucial to monitor for any signs of exploitation attempts by reviewing web server access logs and application logs for unusual or malformed
Hostheaders.Proactive Monitoring: Implement continuous monitoring of web server and application logs for requests containing unusual or mismatched
Hostheaders. Monitor network traffic to and from the ACM server for anomalous patterns, such as connections to unknown external IP addresses. System-level monitoring should be in place to detect unexpected processes, file modifications, or unauthorized user account activity on the server hosting the ACM software.Compensating Controls: If immediate patching is not feasible, implement the following compensating controls:
Hostheaders.Hostheader against a whitelist of known, legitimate hostnames.Exploitation Status
Public Exploit Available: false
Analyst Notes: As of the publication date (Sep 8, 2025), there are no known public proof-of-concept exploits or reports of this vulnerability being actively exploited in the wild. However, given the critical severity and the direct path to remote code execution, security researchers and threat actors are likely to develop exploits rapidly.
Analyst Recommendation
Due to the critical CVSS score of 9.8 and the risk of complete system compromise, it is our strong recommendation to prioritize patching all vulnerable Avigilon ACM instances immediately. A successful exploit could lead to a severe breach of both physical and cybersecurity. Although this CVE is not yet listed on the CISA KEV catalog, its severity makes it a prime candidate for future inclusion. Organizations should treat this as an emergency and apply the vendor-supplied updates without delay.