Cyber Posture

CVE-2017-20213

HighPublic PoC

Published: 08 January 2026

Published
08 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0021 43.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2017-20213 is a high-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Cxsecurity (inferred from references). Its CVSS base score is 7.5 (High).

Operationally, ranked at the 43.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-306

Requires established identification and authentication to unlock, mitigating missing authentication for continued system access.

addresses: CWE-306

Requiring identification and rationale for actions allowed without authentication ensures critical functions are not left unprotected by forcing review of authentication requirements.

addresses: CWE-306

Authorizing mobile device connections to organizational systems ensures authentication is performed for this critical access function.

addresses: CWE-306

Guarantees critical functions are protected by mandatory invocation of the access control mechanism.

addresses: CWE-306

Auditing sessions makes it possible to detect access to critical functions without required authentication.

addresses: CWE-306

The assessment process confirms authentication is present and effective for critical functions, preventing exploitation from missing authentication.

addresses: CWE-306

Certification assesses that critical functions have required authentication controls in place.

addresses: CWE-306

Disabling non-essential functions and services eliminates the need to secure them, reducing exposure from missing authentication on unnecessary components.

NVD Description

FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64 contains an unauthenticated vulnerability that allows remote attackers to access live camera streams without credentials. Attackers can exploit the vulnerability to view unauthorized thermal camera video feeds across multiple camera series without…

more

requiring any authentication.

Deeper analysisAI

CVE-2017-20213 is an unauthenticated vulnerability in the FLIR Thermal Camera F/FC/PT/D Stream firmware version 8.0.0.64, classified under CWE-306 (Missing Authentication for Critical Function). It enables remote attackers to access live camera streams without any credentials, affecting multiple camera series by exposing unauthorized thermal camera video feeds. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with no requirements for privileges, user interaction, or special access.

Remote attackers can exploit this vulnerability over the network with low complexity and no authentication, directly viewing sensitive live thermal video feeds from affected FLIR cameras. Exploitation requires only network access to the camera's stream endpoint, allowing unauthorized surveillance or data exfiltration without detection or disruption to the device.

Advisories and related resources, including exploit details, are documented in references such as cxsecurity.com, packetstormsecurity.com, an archived FLIR security blog post, exploit-db.com, and zeroscience.mk, which outline the issue but do not specify patch availability in the provided details. Security practitioners should consult these for firmware update guidance from FLIR.

Details

CWE(s)

Affected Products

Cxsecurity
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-34732Shared CWE-306
CVE-2025-24865Shared CWE-306
CVE-2025-66049Shared CWE-306
CVE-2026-28458Shared CWE-306
CVE-2026-29132Shared CWE-306
CVE-2026-1453Shared CWE-306
CVE-2026-23693Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2026-32041Shared CWE-306
CVE-2025-55222Shared CWE-306

References