CVE-2023-51127: n/a
FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file. NOTE: The vendor has stated that with the introduction of firmware version 1.49.16 (Jan 2023) the FLIR AX8 should no longer be affected by the vulnerability reported. Latest firmware version (as of Oct 2025, was released Jun 2024) is 1.55.16.
AI Analysis
Technical Summary
CVE-2023-51127 is a directory traversal vulnerability identified in FLIR AX8 thermal sensor cameras running firmware versions up to and including 1.46.16. The root cause is improper access restriction on file uploads, allowing an unauthenticated remote attacker to upload a specially crafted symbolic link file. This symbolic link can point to arbitrary sensitive files on the device, enabling the attacker to read their contents without authentication or user interaction. This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on confidentiality. The vulnerability does not affect integrity or availability. The vendor addressed the issue starting with firmware version 1.49.16 released in January 2023, and the latest firmware version 1.55.16 (released June 2024) remains unaffected. There are no known exploits in the wild at this time, but the vulnerability's nature makes it a significant risk for unauthorized data disclosure from affected devices. FLIR AX8 cameras are commonly used in industrial monitoring, security, and critical infrastructure environments, making the confidentiality breach potentially impactful.
Potential Impact
For European organizations, the primary impact of CVE-2023-51127 is unauthorized disclosure of sensitive information stored on FLIR AX8 thermal sensor cameras. This could include configuration files, logs, or other sensitive data that may reveal operational details or security configurations. Such data leakage could facilitate further attacks or espionage, especially in critical infrastructure sectors like energy, manufacturing, transportation, and public safety where these cameras are deployed. The vulnerability does not allow modification or disruption of device operation, so integrity and availability impacts are minimal. However, the ease of exploitation without authentication and user interaction increases the risk profile. Organizations relying on these devices for security monitoring or operational awareness may face increased exposure to espionage or reconnaissance activities. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially given the availability of the vulnerability details and the straightforward exploitation method.
Mitigation Recommendations
European organizations should immediately verify the firmware version of all deployed FLIR AX8 thermal sensor cameras and upgrade any devices running firmware versions up to 1.46.16 to at least version 1.49.16 or later, preferably the latest 1.55.16 release. Network segmentation should be employed to isolate these devices from untrusted networks, limiting exposure to potential attackers. Implement strict access controls and monitoring on the management interfaces of these cameras to detect any anomalous upload activity. Employ intrusion detection systems (IDS) or security information and event management (SIEM) solutions to alert on suspicious file upload patterns or symbolic link creations. Regularly audit device configurations and logs for signs of exploitation attempts. If firmware updates cannot be immediately applied, consider disabling remote file upload features or restricting access to trusted IP addresses only. Vendor communication channels should be monitored for any patches or advisories related to this vulnerability. Finally, incorporate this vulnerability into risk assessments and incident response plans to ensure preparedness.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Finland
CVE-2023-51127: n/a
Description
FLIR AX8 thermal sensor cameras up to and including 1.46.16 are vulnerable to Directory Traversal due to improper access restriction. This vulnerability allows an unauthenticated, remote attacker to obtain arbitrary sensitive file contents by uploading a specially crafted symbolic link file. NOTE: The vendor has stated that with the introduction of firmware version 1.49.16 (Jan 2023) the FLIR AX8 should no longer be affected by the vulnerability reported. Latest firmware version (as of Oct 2025, was released Jun 2024) is 1.55.16.
AI-Powered Analysis
Technical Analysis
CVE-2023-51127 is a directory traversal vulnerability identified in FLIR AX8 thermal sensor cameras running firmware versions up to and including 1.46.16. The root cause is improper access restriction on file uploads, allowing an unauthenticated remote attacker to upload a specially crafted symbolic link file. This symbolic link can point to arbitrary sensitive files on the device, enabling the attacker to read their contents without authentication or user interaction. This vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The CVSS v3.1 score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on confidentiality. The vulnerability does not affect integrity or availability. The vendor addressed the issue starting with firmware version 1.49.16 released in January 2023, and the latest firmware version 1.55.16 (released June 2024) remains unaffected. There are no known exploits in the wild at this time, but the vulnerability's nature makes it a significant risk for unauthorized data disclosure from affected devices. FLIR AX8 cameras are commonly used in industrial monitoring, security, and critical infrastructure environments, making the confidentiality breach potentially impactful.
Potential Impact
For European organizations, the primary impact of CVE-2023-51127 is unauthorized disclosure of sensitive information stored on FLIR AX8 thermal sensor cameras. This could include configuration files, logs, or other sensitive data that may reveal operational details or security configurations. Such data leakage could facilitate further attacks or espionage, especially in critical infrastructure sectors like energy, manufacturing, transportation, and public safety where these cameras are deployed. The vulnerability does not allow modification or disruption of device operation, so integrity and availability impacts are minimal. However, the ease of exploitation without authentication and user interaction increases the risk profile. Organizations relying on these devices for security monitoring or operational awareness may face increased exposure to espionage or reconnaissance activities. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially given the availability of the vulnerability details and the straightforward exploitation method.
Mitigation Recommendations
European organizations should immediately verify the firmware version of all deployed FLIR AX8 thermal sensor cameras and upgrade any devices running firmware versions up to 1.46.16 to at least version 1.49.16 or later, preferably the latest 1.55.16 release. Network segmentation should be employed to isolate these devices from untrusted networks, limiting exposure to potential attackers. Implement strict access controls and monitoring on the management interfaces of these cameras to detect any anomalous upload activity. Employ intrusion detection systems (IDS) or security information and event management (SIEM) solutions to alert on suspicious file upload patterns or symbolic link creations. Regularly audit device configurations and logs for signs of exploitation attempts. If firmware updates cannot be immediately applied, consider disabling remote file upload features or restricting access to trusted IP addresses only. Vendor communication channels should be monitored for any patches or advisories related to this vulnerability. Finally, incorporate this vulnerability into risk assessments and incident response plans to ensure preparedness.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-12-18T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 683f0a31182aa0cae27f6ede
Added to database: 6/3/2025, 2:44:01 PM
Last enriched: 10/18/2025, 3:39:37 AM
Last updated: 12/4/2025, 11:56:45 AM
Views: 43
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumCVE-2025-13513: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codejunkie Clik stats
MediumCVE-2025-11727: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in codisto Omnichannel for WooCommerce: Google, Amazon, eBay & Walmart Integration – Powered by Codisto
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.