Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65397: n/a

0
Unknown
VulnerabilityCVE-2025-65397cvecve-2025-65397
Published: Wed Jan 14 2026 (01/14/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An insecure authentication mechanism in the safe_exec.sh startup script of Blurams Flare Camera version 24.1114.151.929 and earlier allows an attacker with physical access to the device to execute arbitrary commands with root privileges, if file /opt/images/public_key.der is not present in the file system. The vulnerability can be triggered by providing a maliciously crafted auth.ini file on the device's SD card.

AI-Powered Analysis

AILast updated: 01/14/2026, 17:48:21 UTC

Technical Analysis

CVE-2025-65397 identifies a critical vulnerability in the Blurams Flare Camera's startup script safe_exec.sh, affecting firmware version 24.1114.151.929 and earlier. The vulnerability stems from an insecure authentication mechanism that fails to properly verify the authenticity of configuration files during device startup. Specifically, if the file /opt/images/public_key.der is missing from the device's filesystem, the script does not enforce secure authentication. An attacker with physical access can exploit this by inserting a maliciously crafted auth.ini file onto the device's SD card. Upon device boot, the startup script processes this file without proper validation, allowing arbitrary command execution with root privileges. This can lead to full system compromise, enabling the attacker to manipulate device functions, access sensitive video streams, or pivot into connected networks. The vulnerability does not require network access or user interaction beyond physical access, making it particularly dangerous in environments with limited physical security controls. No patches or firmware updates are currently linked, and no known exploits have been reported in the wild as of the publication date. The lack of a CVSS score necessitates a severity assessment based on impact and exploitability factors.

Potential Impact

For European organizations, this vulnerability presents a significant threat to the confidentiality, integrity, and availability of surveillance systems relying on Blurams Flare Cameras. Unauthorized root access can lead to manipulation or disabling of security cameras, loss of critical video evidence, and potential exposure of sensitive surveillance data. This could compromise physical security monitoring in corporate, governmental, and critical infrastructure environments. The ability to execute arbitrary commands also opens avenues for lateral movement within internal networks if the camera is connected to broader systems. The requirement for physical access limits remote exploitation but raises concerns in locations with public or semi-public access to devices, such as retail stores, transportation hubs, or outdoor surveillance. The absence of known exploits suggests the threat is currently theoretical but could be weaponized by attackers targeting high-value assets. The impact is amplified in sectors where surveillance integrity is paramount, including law enforcement, public safety, and private security firms.

Mitigation Recommendations

1. Immediately verify the presence of the /opt/images/public_key.der file on all Blurams Flare Cameras and restore it if missing. 2. Restrict physical access to devices by deploying them in secured enclosures or monitored areas to prevent unauthorized SD card insertion. 3. Implement strict physical security policies and regular inspections to detect tampering. 4. Monitor device logs for unusual startup behavior or configuration changes indicative of exploitation attempts. 5. Coordinate with Blurams for firmware updates or patches addressing this vulnerability and apply them promptly once available. 6. Consider network segmentation to isolate cameras from critical infrastructure to limit lateral movement in case of compromise. 7. Educate security personnel about the risks of physical access attacks and incorporate this vulnerability into incident response plans. 8. If possible, disable unused interfaces or ports that could facilitate physical access to the device's storage media.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6967d378d0ff220b95084e5d

Added to database: 1/14/2026, 5:33:44 PM

Last enriched: 1/14/2026, 5:48:21 PM

Last updated: 1/14/2026, 7:17:01 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats