CVE-2018-25136
Unauthenticated Video Stream Access in FLIR Brickstream 3D
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| flir | brickstream_3d+ | * |
| flir | brickstream_3d+ | 2.1.742.1842 |
| flir | ax8 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the FLIR Brickstream 3D+ sensor firmware version 2.1.742.1842, allowing remote attackers to access live video streams without any authentication. Attackers can directly retrieve multiple image streams such as middleImage.jpg, rightimage.jpg, leftimage.jpg, and others by sending HTTP requests to the device on port 8083. This unauthorized access exposes live RTSP video streams and images, enabling attackers to surveil areas monitored by the device without credentials. [1, 2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthorized access to live video streams without credentials, posing a privacy risk through unauthorized surveillance. Such unauthorized access to potentially sensitive video data could lead to non-compliance with privacy regulations like GDPR or HIPAA, which require protection of personal and sensitive information. Therefore, the vulnerability may negatively impact compliance with these standards by exposing personal data without proper authorization. [1, 2]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized surveillance and privacy breaches by allowing attackers to access live video feeds without authentication. This can expose sensitive visual information from locations such as retail stores, malls, banks, stadiums, and transportation terminals where the device is deployed. The exposure of live video streams can compromise security and privacy, potentially enabling malicious actors to monitor peopleβs movements and activities without consent. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access the exposed image endpoints on the FLIR Brickstream 3D+ device without authentication. You can use HTTP requests to fetch images such as middleImage.jpg, rightimage.jpg, leftimage.jpg, threeDimage.jpg, and traffic map images on port 8083. For example, using curl commands: curl http://<device-ip>:8083/middleImage.jpg curl http://<device-ip>:8083/rightimage.jpg curl http://<device-ip>:8083/leftimage.jpg If these commands return images without requiring credentials, the device is vulnerable. Additionally, proof-of-concept scripts exist that automate fetching sequences of images from the device. These images can be compiled into video streams using tools like ffmpeg and played with VLC media player for further verification. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting network access to the FLIR Brickstream 3D+ device, especially blocking or limiting access to port 8083 where the vulnerable HTTP endpoints are exposed. Implement network segmentation or firewall rules to prevent unauthorized external access. Check with FLIR Systems for available patches or firmware updates addressing this vulnerability and apply them as soon as possible. Follow FLIR's cybersecurity best practices to secure the device and monitor for unauthorized access attempts. [2]