Product Security


Axis follows industry best practices in managing and responding to security vulnerabilities in our products to minimize customers risk of exposure. Axis cannot guarantee that products and services are free from flaws that may be exploited for malicious attacks.

Announcement (July 18, 2017): Critical vulnerability ACV-116267 ("Devil's Ivy")

Recently a third party discovered a critical vulnerability in Axis products and published a report on July 18th which can be read here. Axis has released a Security Advisory regarding ACV-116267 (which includes a listing of all affected models) and patched firmware for all affected models is available on the firmware download page.

As a precaution, Axis recommends patching affected products in a controlled manner. The vulnerability, which is hard to exploit, does not pose any immediate risk if products are protected by a firewall. 

Contact information

If you identify a security vulnerability in an Axis product or service, please report the problem immediately. Timely identification of security vulnerabilities is critical to eliminating potential threats. 

End-users, partners, vendors, industry groups and independent researchers that have identified a potential risk are encouraged to contact via email to You are welcome to use our public PGP key to encrypt sensitive content.

Note: will only respond to possible product vulnerabilities. For general questions and requests contact: Technical support: 


News update

2018-06-18 Security Advisory ACV-128401 published.  Please follow our recommedations.

2018-04-13 Security Announcement ACV-128401.  Axis recommends to patch affected models

2017-12-01 Security Advisory for ACV-120444 Axis CGI parser published.  Latest firmware patches this vulnerability.

2017-11-28 Security Advisory for CVE-2016-2147/48 (Busybox/DHCP) and CVE-2016-6255/CVE-2016-8863 (UPnP)

2017-07-10 Security Advisory for ACV-116267 ("Devil's Ivy").  List of affected products