CVE-2017-20213 Overview
CVE-2017-20213 is an authentication bypass vulnerability affecting FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64. This vulnerability allows remote attackers to access live camera streams without any credentials. Attackers can exploit this flaw to view unauthorized thermal camera video feeds across multiple camera series, completely bypassing authentication controls.
Critical Impact
Unauthenticated remote attackers can gain full access to live thermal camera video streams, potentially exposing sensitive surveillance footage and compromising physical security monitoring systems.
Affected Products
- FLIR Thermal Camera F Series (firmware version 8.0.0.64)
- FLIR Thermal Camera FC Series (firmware version 8.0.0.64)
- FLIR Thermal Camera PT Series (firmware version 8.0.0.64)
- FLIR Thermal Camera D Stream Series (firmware version 8.0.0.64)
Discovery Timeline
- 2026-01-08 - CVE-2017-20213 published to NVD
- 2026-01-08 - Last updated in NVD database
Technical Details for CVE-2017-20213
Vulnerability Analysis
This vulnerability is classified under CWE-306 (Missing Authentication for Critical Function). The FLIR thermal camera firmware fails to implement proper authentication mechanisms for accessing live video streams. The vulnerable firmware exposes stream endpoints that should require authentication but instead allow any network-accessible attacker to connect and view the camera feed directly.
The network-accessible nature of this vulnerability means that any attacker who can reach the camera's network interface can exploit this flaw without needing valid credentials. This is particularly concerning for thermal cameras deployed in security-sensitive environments such as industrial facilities, critical infrastructure, and perimeter monitoring systems.
Root Cause
The root cause of CVE-2017-20213 is the complete absence of authentication controls on the video streaming endpoints within firmware version 8.0.0.64. The firmware developers failed to implement access control checks before serving live camera streams, leaving the stream URLs accessible to anyone with network connectivity to the device. This represents a fundamental design flaw in the firmware's security architecture.
Attack Vector
The attack vector is network-based with no authentication required. An attacker can exploit this vulnerability by:
- Identifying FLIR thermal cameras on the target network through network scanning or reconnaissance
- Connecting directly to the camera's streaming endpoint without providing any credentials
- Viewing the live thermal video feed in real-time
The exploitation is straightforward and requires no specialized tools beyond basic network connectivity. An attacker simply needs to access the camera's streaming URL directly, as the firmware performs no verification of the requester's identity or authorization.
For technical details on exploitation methods, security researchers can reference the Zero Science Vulnerability ZSL-2017-5435 and Exploit-DB #42789.
Detection Methods for CVE-2017-20213
Indicators of Compromise
- Unexpected network connections to camera streaming ports from unauthorized IP addresses
- Unusual bandwidth consumption patterns indicating video stream exfiltration
- Network traffic analysis showing unauthenticated requests to camera stream endpoints
- Log entries showing stream access from external or unexpected network segments
Detection Strategies
- Implement network monitoring to detect unauthorized access attempts to FLIR camera endpoints
- Deploy intrusion detection rules to identify direct stream access without preceding authentication
- Use network traffic analysis to identify anomalous connections to IoT/camera devices
- Monitor for scanning activity targeting common camera ports and FLIR-specific services
Monitoring Recommendations
- Enable logging on network perimeter devices to capture traffic to/from camera systems
- Implement network segmentation monitoring to detect cross-segment access to surveillance infrastructure
- Deploy alerts for any direct external network access to camera devices
- Conduct regular network audits to identify exposed camera systems
How to Mitigate CVE-2017-20213
Immediate Actions Required
- Isolate affected FLIR thermal cameras from untrusted network segments immediately
- Implement network segmentation to restrict camera access to authorized management systems only
- Deploy firewall rules to block external access to camera streaming ports
- Audit network access logs to identify any potential unauthorized stream access
Patch Information
Organizations should check the Web Archive FLIR Security Blog for official vendor guidance and firmware updates. Contact FLIR directly to obtain the latest firmware version that addresses this authentication bypass vulnerability. Verify that updated firmware implements proper authentication for all stream access endpoints before deployment.
Additional technical details are available from CXSecurity Issue WLB-2017090204 and Packet Storm File #144323.
Workarounds
- Place affected cameras behind a VPN gateway requiring authentication before network access
- Implement firewall rules to whitelist only authorized IP addresses for camera access
- Deploy a reverse proxy with authentication in front of camera streaming endpoints
- Use network access control (NAC) to restrict which devices can communicate with cameras
# Example firewall rule to restrict camera access (iptables)
# Replace CAMERA_IP and AUTHORIZED_SUBNET with your values
iptables -A INPUT -d CAMERA_IP -s AUTHORIZED_SUBNET -j ACCEPT
iptables -A INPUT -d CAMERA_IP -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

