CVE-2018-25141
Unauthenticated Video Stream Access in FLIR Thermal Cameras
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| flir | tiip2 | * |
| flir | vip-ip | * |
| flir | trafiradar | * |
| nginx | nginx | 1.8.0 |
| flir | trafione | * |
| flir | traficam | * |
| nginx | nginx | 1.10.2 |
| nginx | nginx | 1.12.1 |
| flir | trafisense | * |
| flir | tiip4edge | * |
| flir | thermicam | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects FLIR thermal traffic cameras and allows remote attackers to access live video streams without any authentication. Attackers can retrieve live video feeds by accessing specific endpoints such as /live.mjpeg, /snapshot.jpg, and RTSP streaming URLs directly, exposing sensitive video data without needing credentials. [1, 2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated access to live video streams from FLIR thermal traffic cameras, potentially exposing sensitive video data without authorization. This exposure of sensitive personal or surveillance data could lead to non-compliance with privacy regulations such as GDPR or HIPAA, which require protection of personal and sensitive information. However, specific impacts on compliance with these standards are not detailed in the provided resources. [1, 2]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to live video streams from FLIR thermal traffic cameras, potentially exposing sensitive traffic monitoring footage. This exposure can compromise privacy and security in environments where these cameras are deployed, such as traffic monitoring and dynamic traffic signal control systems. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access the live video streams from the FLIR thermal traffic cameras without authentication. You can try HTTP requests to endpoints such as /live.mjpeg?id=1 and /snapshot.jpg, or RTSP requests to URLs like rtsp://Target/mpeg4. For example, using curl or wget to fetch http://<camera-ip>/live.mjpeg?id=1 or http://<camera-ip>/snapshot.jpg can help verify if the streams are accessible without credentials. Similarly, using an RTSP client to connect to rtsp://<camera-ip>/mpeg4 can test for unauthorized RTSP stream access. [2]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the affected FLIR thermal traffic cameras to the patched firmware versions released by FLIR as of September 2018. Applying these firmware updates will fix the unauthenticated access vulnerability. Additionally, restricting network access to the cameras and implementing network-level controls to limit exposure of the camera endpoints can help reduce risk until patches are applied. [1, 2]