CVE-2017-20214 Overview
CVE-2017-20214 is a critical hardcoded credentials vulnerability affecting FLIR Thermal Camera F/FC/PT/D firmware version 8.0.0.64. The firmware contains hard-coded SSH credentials that cannot be changed through normal camera operations, allowing attackers to leverage these persistent, unmodifiable credentials to gain unauthorized remote access to the thermal camera system.
Critical Impact
Attackers with network access can exploit immutable SSH credentials to gain full remote access to FLIR thermal camera systems, potentially compromising surveillance infrastructure and sensitive thermal imaging data.
Affected Products
- FLIR Thermal Camera F Series (firmware version 8.0.0.64)
- FLIR Thermal Camera FC Series (firmware version 8.0.0.64)
- FLIR Thermal Camera PT Series (firmware version 8.0.0.64)
- FLIR Thermal Camera D Series (firmware version 8.0.0.64)
Discovery Timeline
- 2026-01-08 - CVE-2017-20214 published to NVD
- 2026-01-08 - Last updated in NVD database
Technical Details for CVE-2017-20214
Vulnerability Analysis
This vulnerability falls under CWE-798 (Use of Hard-coded Credentials), a critical security flaw where authentication credentials are embedded directly into the device firmware. The FLIR thermal camera systems contain static SSH credentials that persist across reboots and cannot be modified by administrators through the camera's normal configuration interface.
The attack surface is significant given the network-accessible nature of the vulnerability. An attacker does not require any prior authentication or user interaction to exploit this flaw. Once the hard-coded credentials are discovered (which has occurred through public disclosure), any network-adjacent or internet-exposed FLIR camera running the affected firmware becomes immediately vulnerable.
Successful exploitation grants attackers full SSH access to the underlying camera operating system, enabling complete control over the device including the ability to view or manipulate thermal imaging feeds, pivot to other network resources, install persistent backdoors, or disable security monitoring capabilities.
Root Cause
The root cause of this vulnerability is the inclusion of hard-coded SSH credentials within the FLIR camera firmware during the development process. These credentials were embedded directly into the firmware image without providing administrators any mechanism to rotate or change them. This is a common anti-pattern in IoT and embedded device development where convenience during manufacturing or support processes leads to significant security weaknesses.
The credentials appear to have been intended for factory access, debugging, or technical support purposes but were inadvertently left enabled in production firmware. The inability to modify these credentials through standard camera operations means that even security-conscious administrators cannot remediate this vulnerability through configuration changes alone.
Attack Vector
The attack vector is network-based, requiring only network connectivity to the target FLIR thermal camera. The exploitation process involves connecting to the camera's SSH service (typically port 22) and authenticating using the publicly disclosed hard-coded credentials.
The attack can be performed with the following general approach:
- Identify FLIR thermal cameras on the network through port scanning or banner grabbing
- Attempt SSH connection to the discovered camera
- Authenticate using the known hard-coded credentials
- Gain full shell access to the camera's operating system
For detailed technical information about this vulnerability, including specific credential details, see the Zero Science Labs Advisory ZSL-2017-5436 and the Exploit-DB #42787 entry.
Detection Methods for CVE-2017-20214
Indicators of Compromise
- Unexpected SSH connections to FLIR thermal camera devices from unknown IP addresses
- Multiple successful SSH authentication events to camera systems in short time periods
- SSH sessions originating from unusual geographic locations or at unusual times
- Anomalous commands executed on camera systems visible in system logs
- Unauthorized changes to camera configuration or imaging settings
Detection Strategies
- Deploy network intrusion detection rules to identify SSH connection attempts to FLIR camera IP addresses
- Monitor for successful authentication events on camera devices that do not correlate with known administrative activity
- Implement network segmentation monitoring to detect lateral movement from compromised camera devices
- Use behavioral analytics to identify unusual data exfiltration patterns from camera network segments
Monitoring Recommendations
- Centralize logging from all FLIR thermal camera devices to a SIEM platform for correlation analysis
- Establish baseline SSH connection patterns and alert on deviations
- Monitor network traffic to and from camera devices for unusual volume or destination patterns
- Implement regular firmware version audits to track affected devices in your environment
How to Mitigate CVE-2017-20214
Immediate Actions Required
- Audit your environment to identify all FLIR Thermal Camera F/FC/PT/D devices running firmware version 8.0.0.64
- Isolate affected cameras from direct internet access immediately
- Implement strict network segmentation to limit SSH access to camera devices from only authorized management workstations
- Review SSH logs on affected devices for evidence of unauthorized access
- Consider disabling SSH service at the network level if remote management is not required
Patch Information
FLIR has acknowledged this vulnerability. Administrators should review the FLIR Security Blog Post for official guidance and firmware updates. Contact FLIR support to obtain the latest firmware version that addresses this hard-coded credential issue.
Additional technical details are available from CXSecurity Issue WLB-2017090205 and Packet Storm File 144324.
Workarounds
- Deploy host-based firewall rules to restrict SSH access to specific trusted IP addresses
- Place affected cameras behind a VPN gateway requiring authentication before network access
- Implement network access control lists (ACLs) at the switch or router level to block SSH traffic to cameras from unauthorized sources
- Consider deploying a jump host architecture where camera management requires multi-factor authentication before accessing the management network
# Example network firewall rule to restrict SSH access to FLIR cameras
# Allow SSH only from management workstation 192.168.1.100
iptables -A INPUT -p tcp -s 192.168.1.100 --dport 22 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


