Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33124: CWE-287: Improper Authentication in blakeblackshear frigate

0
High
VulnerabilityCVE-2026-33124cvecve-2026-33124cwe-287
Published: Fri Mar 20 2026 (03/20/2026, 09:16:04 UTC)
Source: CVE Database V5
Vendor/Project: blakeblackshear
Product: frigate

Description

CVE-2026-33124 is a high-severity improper authentication vulnerability in blakeblackshear's Frigate NVR software versions prior to 0. 17. 0-beta1. It allows any authenticated user to change their own password without verifying the current password via the /users/{username}/password endpoint. Password changes do not invalidate existing JWT tokens, enabling attackers who obtain valid session tokens to maintain persistent access even after password resets. The lack of password strength validation further exposes accounts to brute-force attacks. Exploitation requires possession of a valid session token, which can be obtained through various means such as stolen cookies or XSS. This vulnerability compromises account integrity and confidentiality, potentially leading to full account takeover. The issue has been fixed in version 0. 17.

AI-Powered Analysis

AILast updated: 03/20/2026, 14:08:47 UTC

Technical Analysis

Frigate is a network video recorder (NVR) software that supports real-time local object detection for IP cameras. Versions before 0.17.0-beta1 contain a critical improper authentication vulnerability (CWE-287) identified as CVE-2026-33124. The flaw resides in the password change functionality exposed at the /users/{username}/password endpoint, which allows authenticated users to change their own password without verifying the current password. This means that if an attacker gains access to a valid JWT session token—potentially through stolen cookies, cross-site scripting (XSS), compromised devices, or network sniffing over unencrypted HTTP—they can change the victim’s password and gain permanent control of the account. Notably, changing the password does not invalidate existing JWT tokens, so any previously obtained tokens remain valid, allowing persistent session hijacking. Additionally, the system does not enforce password strength requirements, increasing susceptibility to brute-force attacks. The vulnerability has a CVSS 4.0 score of 8.6 (high severity), reflecting its ease of exploitation (network attack vector, low complexity, no user interaction) and significant impact on confidentiality and integrity. No known exploits are reported in the wild yet. The vendor addressed this issue in version 0.17.0-beta1 by adding proper authentication checks and presumably improving session invalidation and password policies.

Potential Impact

The vulnerability allows attackers who have obtained a valid session token to change user passwords without current password verification, leading to full account takeover. Because existing JWT tokens are not invalidated upon password change, attackers can maintain persistent access even after the victim attempts to reset their password. This undermines the confidentiality and integrity of user accounts and potentially the entire NVR system. Compromised accounts could allow attackers to manipulate video feeds, disable security monitoring, or exfiltrate sensitive surveillance data. The lack of password strength enforcement further increases the risk of brute-force attacks, potentially expanding the attacker base. Organizations relying on Frigate for IP camera management face risks of unauthorized surveillance access, privacy violations, and operational disruptions. The vulnerability’s network-based attack vector and no requirement for user interaction make it highly exploitable in environments where session tokens are exposed or weakly protected.

Mitigation Recommendations

1. Upgrade all Frigate installations to version 0.17.0-beta1 or later immediately to apply the official fix. 2. Implement strict session management policies: ensure JWT tokens are invalidated upon password changes or logout events to prevent persistent session hijacking. 3. Enforce strong password policies with complexity requirements and rate limiting to mitigate brute-force attacks. 4. Use secure transport protocols (e.g., HTTPS/TLS) exclusively to prevent token interception via network sniffing. 5. Monitor and audit authentication logs for suspicious activities such as unusual password changes or multiple failed login attempts. 6. Employ web application firewalls (WAF) and Content Security Policy (CSP) headers to reduce the risk of XSS attacks that could expose session tokens. 7. Educate users and administrators about the risks of token exposure and encourage secure handling of authentication credentials. 8. Consider implementing multi-factor authentication (MFA) if supported by the platform or via proxy solutions to add an additional security layer.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T20:35:49.926Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bd5190e32a4fbe5f999481

Added to database: 3/20/2026, 1:54:24 PM

Last enriched: 3/20/2026, 2:08:47 PM

Last updated: 3/20/2026, 3:00:29 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses