CVE-2026-33125: CWE-285: Improper Authorization in blakeblackshear frigate
CVE-2026-33125 is a high-severity improper authorization vulnerability in the Frigate NVR software versions 0. 16. 2 and below. It allows users with the viewer role to delete admin and low-privileged user accounts without proper authorization. Exploiting this flaw can cause denial of service (DoS) by removing critical user accounts and compromise data integrity. The vulnerability requires low privileges (viewer role) and no user interaction, making it relatively easy to exploit remotely. It has been patched in version 0. 16. 3. Organizations using affected versions should upgrade immediately to prevent potential disruption and unauthorized account deletions.
AI Analysis
Technical Summary
Frigate is an open-source network video recorder (NVR) designed for real-time local object detection on IP cameras. In versions 0.16.2 and earlier, a critical authorization flaw (CWE-285) exists whereby users assigned the viewer role—intended to have read-only access—can delete accounts belonging to administrators and other low-privileged users. This improper authorization vulnerability arises from insufficient access control checks on account deletion functionality. Since the viewer role is typically granted to less trusted users, this flaw allows an attacker with minimal privileges to escalate their impact by removing key user accounts, potentially locking out legitimate administrators and disrupting system operations. The consequence is a denial of service condition and potential data integrity issues, as user management is compromised. The vulnerability has a CVSS 3.1 base score of 7.1, reflecting high severity due to its network attack vector, low complexity, and lack of required user interaction. No known exploits are currently reported in the wild, but the flaw has been publicly disclosed and patched in version 0.16.3. Organizations running vulnerable versions should prioritize upgrading to mitigate risks.
Potential Impact
The primary impact of this vulnerability is denial of service through deletion of administrative and other user accounts, which can prevent legitimate access to the Frigate NVR system. This disruption can halt video surveillance monitoring and recording, critical for security operations in organizations relying on IP cameras. Additionally, the integrity of user management is compromised, potentially allowing attackers to manipulate account configurations or remove audit trails. The vulnerability affects confidentiality less directly but may facilitate further attacks by disabling administrative oversight. Because the flaw can be exploited by users with viewer privileges without user interaction, it lowers the barrier for insider threats or compromised low-privilege accounts to cause significant operational damage. Organizations in sectors such as physical security, critical infrastructure monitoring, and enterprise surveillance are particularly at risk, as disruption of video recording can impact incident response and safety.
Mitigation Recommendations
The definitive mitigation is to upgrade Frigate to version 0.16.3 or later, where the authorization checks have been corrected. Until upgrading is possible, organizations should restrict viewer role assignments to trusted users only and monitor user account deletions closely. Implement network segmentation to limit access to the Frigate management interface, ensuring only authorized personnel can connect. Employ strong authentication and logging to detect unusual account management activities. Additionally, consider deploying compensating controls such as multi-factor authentication for administrative accounts and regular backups of user configurations to enable recovery from unauthorized deletions. Security teams should review access control policies and conduct audits to verify that least privilege principles are enforced.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, South Korea, Singapore
CVE-2026-33125: CWE-285: Improper Authorization in blakeblackshear frigate
Description
CVE-2026-33125 is a high-severity improper authorization vulnerability in the Frigate NVR software versions 0. 16. 2 and below. It allows users with the viewer role to delete admin and low-privileged user accounts without proper authorization. Exploiting this flaw can cause denial of service (DoS) by removing critical user accounts and compromise data integrity. The vulnerability requires low privileges (viewer role) and no user interaction, making it relatively easy to exploit remotely. It has been patched in version 0. 16. 3. Organizations using affected versions should upgrade immediately to prevent potential disruption and unauthorized account deletions.
AI-Powered Analysis
Technical Analysis
Frigate is an open-source network video recorder (NVR) designed for real-time local object detection on IP cameras. In versions 0.16.2 and earlier, a critical authorization flaw (CWE-285) exists whereby users assigned the viewer role—intended to have read-only access—can delete accounts belonging to administrators and other low-privileged users. This improper authorization vulnerability arises from insufficient access control checks on account deletion functionality. Since the viewer role is typically granted to less trusted users, this flaw allows an attacker with minimal privileges to escalate their impact by removing key user accounts, potentially locking out legitimate administrators and disrupting system operations. The consequence is a denial of service condition and potential data integrity issues, as user management is compromised. The vulnerability has a CVSS 3.1 base score of 7.1, reflecting high severity due to its network attack vector, low complexity, and lack of required user interaction. No known exploits are currently reported in the wild, but the flaw has been publicly disclosed and patched in version 0.16.3. Organizations running vulnerable versions should prioritize upgrading to mitigate risks.
Potential Impact
The primary impact of this vulnerability is denial of service through deletion of administrative and other user accounts, which can prevent legitimate access to the Frigate NVR system. This disruption can halt video surveillance monitoring and recording, critical for security operations in organizations relying on IP cameras. Additionally, the integrity of user management is compromised, potentially allowing attackers to manipulate account configurations or remove audit trails. The vulnerability affects confidentiality less directly but may facilitate further attacks by disabling administrative oversight. Because the flaw can be exploited by users with viewer privileges without user interaction, it lowers the barrier for insider threats or compromised low-privilege accounts to cause significant operational damage. Organizations in sectors such as physical security, critical infrastructure monitoring, and enterprise surveillance are particularly at risk, as disruption of video recording can impact incident response and safety.
Mitigation Recommendations
The definitive mitigation is to upgrade Frigate to version 0.16.3 or later, where the authorization checks have been corrected. Until upgrading is possible, organizations should restrict viewer role assignments to trusted users only and monitor user account deletions closely. Implement network segmentation to limit access to the Frigate management interface, ensuring only authorized personnel can connect. Employ strong authentication and logging to detect unusual account management activities. Additionally, consider deploying compensating controls such as multi-factor authentication for administrative accounts and regular backups of user configurations to enable recovery from unauthorized deletions. Security teams should review access control policies and conduct audits to verify that least privilege principles are enforced.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T20:35:49.926Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bd194ce32a4fbe5f4ea6bc
Added to database: 3/20/2026, 9:54:20 AM
Last enriched: 3/20/2026, 10:08:48 AM
Last updated: 3/20/2026, 10:55:52 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.