CVE-2026-33124: CWE-287: Improper Authentication in blakeblackshear frigate
CVE-2026-33124 is a high-severity improper authentication vulnerability in blakeblackshear's Frigate NVR software versions prior to 0. 17. 0-beta1. It allows any authenticated user to change their own password without verifying the current password via the /users/{username}/password endpoint. Password changes do not invalidate existing JWT tokens, enabling attackers who obtain valid session tokens to maintain persistent access even after password resets. The lack of password strength validation further exposes accounts to brute-force attacks. Exploitation requires possession of a valid session token, which can be obtained through various means such as stolen cookies or XSS. This vulnerability compromises account integrity and confidentiality, potentially leading to full account takeover. The issue has been fixed in version 0. 17.
AI Analysis
Technical Summary
Frigate is a network video recorder (NVR) software that supports real-time local object detection for IP cameras. Versions before 0.17.0-beta1 contain a critical improper authentication vulnerability (CWE-287) identified as CVE-2026-33124. The flaw resides in the password change functionality exposed at the /users/{username}/password endpoint, which allows authenticated users to change their own password without verifying the current password. This means that if an attacker gains access to a valid JWT session token—potentially through stolen cookies, cross-site scripting (XSS), compromised devices, or network sniffing over unencrypted HTTP—they can change the victim’s password and gain permanent control of the account. Notably, changing the password does not invalidate existing JWT tokens, so any previously obtained tokens remain valid, allowing persistent session hijacking. Additionally, the system does not enforce password strength requirements, increasing susceptibility to brute-force attacks. The vulnerability has a CVSS 4.0 score of 8.6 (high severity), reflecting its ease of exploitation (network attack vector, low complexity, no user interaction) and significant impact on confidentiality and integrity. No known exploits are reported in the wild yet. The vendor addressed this issue in version 0.17.0-beta1 by adding proper authentication checks and presumably improving session invalidation and password policies.
Potential Impact
The vulnerability allows attackers who have obtained a valid session token to change user passwords without current password verification, leading to full account takeover. Because existing JWT tokens are not invalidated upon password change, attackers can maintain persistent access even after the victim attempts to reset their password. This undermines the confidentiality and integrity of user accounts and potentially the entire NVR system. Compromised accounts could allow attackers to manipulate video feeds, disable security monitoring, or exfiltrate sensitive surveillance data. The lack of password strength enforcement further increases the risk of brute-force attacks, potentially expanding the attacker base. Organizations relying on Frigate for IP camera management face risks of unauthorized surveillance access, privacy violations, and operational disruptions. The vulnerability’s network-based attack vector and no requirement for user interaction make it highly exploitable in environments where session tokens are exposed or weakly protected.
Mitigation Recommendations
1. Upgrade all Frigate installations to version 0.17.0-beta1 or later immediately to apply the official fix. 2. Implement strict session management policies: ensure JWT tokens are invalidated upon password changes or logout events to prevent persistent session hijacking. 3. Enforce strong password policies with complexity requirements and rate limiting to mitigate brute-force attacks. 4. Use secure transport protocols (e.g., HTTPS/TLS) exclusively to prevent token interception via network sniffing. 5. Monitor and audit authentication logs for suspicious activities such as unusual password changes or multiple failed login attempts. 6. Employ web application firewalls (WAF) and Content Security Policy (CSP) headers to reduce the risk of XSS attacks that could expose session tokens. 7. Educate users and administrators about the risks of token exposure and encourage secure handling of authentication credentials. 8. Consider implementing multi-factor authentication (MFA) if supported by the platform or via proxy solutions to add an additional security layer.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Korea, Singapore
CVE-2026-33124: CWE-287: Improper Authentication in blakeblackshear frigate
Description
CVE-2026-33124 is a high-severity improper authentication vulnerability in blakeblackshear's Frigate NVR software versions prior to 0. 17. 0-beta1. It allows any authenticated user to change their own password without verifying the current password via the /users/{username}/password endpoint. Password changes do not invalidate existing JWT tokens, enabling attackers who obtain valid session tokens to maintain persistent access even after password resets. The lack of password strength validation further exposes accounts to brute-force attacks. Exploitation requires possession of a valid session token, which can be obtained through various means such as stolen cookies or XSS. This vulnerability compromises account integrity and confidentiality, potentially leading to full account takeover. The issue has been fixed in version 0. 17.
AI-Powered Analysis
Technical Analysis
Frigate is a network video recorder (NVR) software that supports real-time local object detection for IP cameras. Versions before 0.17.0-beta1 contain a critical improper authentication vulnerability (CWE-287) identified as CVE-2026-33124. The flaw resides in the password change functionality exposed at the /users/{username}/password endpoint, which allows authenticated users to change their own password without verifying the current password. This means that if an attacker gains access to a valid JWT session token—potentially through stolen cookies, cross-site scripting (XSS), compromised devices, or network sniffing over unencrypted HTTP—they can change the victim’s password and gain permanent control of the account. Notably, changing the password does not invalidate existing JWT tokens, so any previously obtained tokens remain valid, allowing persistent session hijacking. Additionally, the system does not enforce password strength requirements, increasing susceptibility to brute-force attacks. The vulnerability has a CVSS 4.0 score of 8.6 (high severity), reflecting its ease of exploitation (network attack vector, low complexity, no user interaction) and significant impact on confidentiality and integrity. No known exploits are reported in the wild yet. The vendor addressed this issue in version 0.17.0-beta1 by adding proper authentication checks and presumably improving session invalidation and password policies.
Potential Impact
The vulnerability allows attackers who have obtained a valid session token to change user passwords without current password verification, leading to full account takeover. Because existing JWT tokens are not invalidated upon password change, attackers can maintain persistent access even after the victim attempts to reset their password. This undermines the confidentiality and integrity of user accounts and potentially the entire NVR system. Compromised accounts could allow attackers to manipulate video feeds, disable security monitoring, or exfiltrate sensitive surveillance data. The lack of password strength enforcement further increases the risk of brute-force attacks, potentially expanding the attacker base. Organizations relying on Frigate for IP camera management face risks of unauthorized surveillance access, privacy violations, and operational disruptions. The vulnerability’s network-based attack vector and no requirement for user interaction make it highly exploitable in environments where session tokens are exposed or weakly protected.
Mitigation Recommendations
1. Upgrade all Frigate installations to version 0.17.0-beta1 or later immediately to apply the official fix. 2. Implement strict session management policies: ensure JWT tokens are invalidated upon password changes or logout events to prevent persistent session hijacking. 3. Enforce strong password policies with complexity requirements and rate limiting to mitigate brute-force attacks. 4. Use secure transport protocols (e.g., HTTPS/TLS) exclusively to prevent token interception via network sniffing. 5. Monitor and audit authentication logs for suspicious activities such as unusual password changes or multiple failed login attempts. 6. Employ web application firewalls (WAF) and Content Security Policy (CSP) headers to reduce the risk of XSS attacks that could expose session tokens. 7. Educate users and administrators about the risks of token exposure and encourage secure handling of authentication credentials. 8. Consider implementing multi-factor authentication (MFA) if supported by the platform or via proxy solutions to add an additional security layer.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T20:35:49.926Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69bd5190e32a4fbe5f999481
Added to database: 3/20/2026, 1:54:24 PM
Last enriched: 3/20/2026, 2:08:47 PM
Last updated: 3/20/2026, 3:00:29 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.