In light of recent CCTV vulnerabilities, Wavestore has highlighted why security-first design matters.
“The surveillance industry was shaken recently when security researchers at Claroty’s Team82 uncovered four critical vulnerabilities in Axis Communications’ CCTV software at Black Hat USA 2024.
“With over 6,500 servers potentially exposed worldwide and the most critical flaw scoring 9.0 on the CVSS scale, this incident highlights a fundamental truth: in today’s threat landscape, security cannot be an afterthought in video management systems.
The Scope of the Problem
“The vulnerabilities discovered in Axis’ proprietary communication protocol demonstrate how seemingly minor flaws in system architecture can expose entire organisations to devastating attacks.
“The most severe vulnerability (CVE-2025-30023) enables authenticated users to execute remote code, potentially giving attackers complete control over surveillance infrastructure.
“When you consider that each vulnerable server could manage hundreds or thousands of individual cameras, the potential impact becomes staggering.
“What’s particularly concerning is that over 4,000 of these exposed servers are located in the United States alone, according to internet scanning tools like Censys and Shodan.
“This means thousands of organisations—from small businesses to critical infrastructure providers—may have unknowingly operated with compromised security for an extended period.
The Cost of Reactive Security
“These vulnerabilities stem from fundamental flaws in Axis.Remoting, the proprietary communication protocol used between client applications and Axis servers. The research revealed multiple attack vectors:
- Remote Code Execution: Allowing attackers to run malicious code on both server and client systems
- Man-in-the-Middle Attacks: Enabling traffic interception and decryption
- Authentication Bypass: Granting unauthorised access to camera systems
- Privilege Escalation: Allowing attackers to gain elevated system permissions
“While Axis has released patches, the incident raises important questions about the security-first approach in VMS development. How many organisations are still running unpatched systems?
“How long were these vulnerabilities present before discovery? And most critically, what other undiscovered vulnerabilities might exist in proprietary protocols?
The Wavestore Difference: Security by Design
“At Wavestore, we’ve always believed that true security comes from building it into the foundation of our platform, not bolting it on afterward. Our approach differs fundamentally from vendors who rely on proprietary protocols that can hide critical vulnerabilities.
Open Standards, Transparent Security
“Unlike proprietary communication protocols that operate as “black boxes,” Wavestore’s VMS platform is built on open standards and industry-proven security frameworks.
“This transparency means our security measures can be independently verified, audited, and continuously improved by the broader security community.
Multi-Layered Protection
Our security architecture incorporates multiple defensive layers that are pre-configured as standard, providing ultimate protection from the moment the system is switched on:
- No Back-Door Access: Unlike many vendors who maintain generic “root login” back-doors, Wavestore requires physical presence at the server for any remote diagnostics, with temporary accounts that administrators fully control
- Secure Linux Foundation: Built on a hardened Linux operating system, eliminating Windows vulnerabilities and reducing attack surface by disabling all non-essential components
- Advanced Encryption: Up to 4096-bit encryption for video data with secure public key options and password-protected encryption for evidence export
- Built-in Firewall: Standard firewall protection that locks down ports and prevents unauthorised connections
- IP Address Restrictions: Capability to restrict access to only authorised IP addresses, eliminating remote unauthorised access risks
- Application Isolation: No third-party applications can run on Wavestore servers, preventing malicious program execution
Zero-Trust Architecture
Wavestore implements zero-trust principles throughout our platform with sophisticated built-in protections:
- Strong Authentication: Login details use robust password hashes with mandatory password policies requiring complex combinations and regular changes
- Man-in-the-Middle Protection: Standard protection against MitM attacks that were highlighted as a key vulnerability in the Axis research
- Privilege Separation: Key processes run as non-administrator users, limiting potential damage from any security breach
- Ongoing Security Testing: Continuous third-party security audits and vulnerability testing ensure proactive threat mitigation
“This approach means that even if one component faces an attack attempt, multiple layers of defence prevent system compromise—a stark contrast to the single-point-of-failure vulnerabilities discovered in proprietary protocols.
Choosing the Right Partner in an Uncertain Landscape
“The Axis vulnerabilities underscore an important reality facing security professionals today. As the researchers noted, “Given current bans on Chinese technology in many corners of the world, an organisation’s choice of vendors has become somewhat limited, putting more emphasis on the protection of platforms available for these deployments.”
“This constraint makes vendor selection more critical than ever. Organizations can’t simply avoid certain manufacturers; they must actively choose partners who demonstrate genuine commitment to security excellence.
Key Questions to Ask Your VMS Vendor
“When evaluating video management systems, security professionals should ask:
- Protocol Transparency: Does your VMS use proprietary protocols that can’t be independently audited?
- Vulnerability Response: What’s your timeline for security patch deployment?
- Security Testing: How frequently do you conduct penetration testing and security audits?
- Architecture Design: Is security built into the core architecture or added as a feature?
- Compliance Support: How do you help organizations meet regulatory security requirements?
Best Practices: Beyond Your VMS Choice
“While choosing a secure VMS platform like Wavestore provides a strong foundation, organisations should also implement these essential security practices:
Installation Security
- Change Default Passwords: The most common oversight in security installations. Wavestore enforces this best practice by requiring password changes from default settings on first power-on
- Physical Security: Secure your recording equipment in locked areas. Even the most secure software can’t protect against physical tampering
- Network Design: Implement proper network segmentation and security across your entire infrastructure
The Path Forward
“The surveillance industry stands at a crossroads. We can continue with reactive security approaches, patching vulnerabilities after they’re discovered and exploited, or we can embrace proactive, security-first design principles.
“Wavestore has chosen the latter path. Our commitment to transparent, auditable security measures ensures that organizations using our VMS platform can focus on their core mission rather than worrying about undiscovered vulnerabilities in their surveillance infrastructure.
Protecting What Matters Most
“Video surveillance systems protect our most valuable assets—our people, property, and operations. The recent Axis vulnerabilities remind us that the systems designed to provide security can themselves become security risks if not properly designed and maintained.
“At Wavestore, we understand this responsibility. Our security-first approach isn’t just about preventing attacks; it’s about providing the peace of mind that comes from knowing your surveillance infrastructure is as secure as the assets it protects.
“As organisations evaluate their video management needs in light of these recent discoveries, we invite them to experience the difference that security-by-design can make.
“Because in today’s threat landscape, your VMS shouldn’t just record security events—it should exemplify them.”
To read more Wavestore news, click here.