Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33125: CWE-285: Improper Authorization in blakeblackshear frigate

0
High
VulnerabilityCVE-2026-33125cvecve-2026-33125cwe-285
Published: Fri Mar 20 2026 (03/20/2026, 09:22:39 UTC)
Source: CVE Database V5
Vendor/Project: blakeblackshear
Product: frigate

Description

CVE-2026-33125 is a high-severity improper authorization vulnerability in the Frigate NVR software versions 0. 16. 2 and below. It allows users with the viewer role to delete admin and low-privileged user accounts without proper authorization. Exploiting this flaw can cause denial of service (DoS) by removing critical user accounts and compromise data integrity. The vulnerability requires low privileges (viewer role) and no user interaction, making it relatively easy to exploit remotely. It has been patched in version 0. 16. 3. Organizations using affected versions should upgrade immediately to prevent potential disruption and unauthorized account deletions.

AI-Powered Analysis

AILast updated: 03/20/2026, 10:08:48 UTC

Technical Analysis

Frigate is an open-source network video recorder (NVR) designed for real-time local object detection on IP cameras. In versions 0.16.2 and earlier, a critical authorization flaw (CWE-285) exists whereby users assigned the viewer role—intended to have read-only access—can delete accounts belonging to administrators and other low-privileged users. This improper authorization vulnerability arises from insufficient access control checks on account deletion functionality. Since the viewer role is typically granted to less trusted users, this flaw allows an attacker with minimal privileges to escalate their impact by removing key user accounts, potentially locking out legitimate administrators and disrupting system operations. The consequence is a denial of service condition and potential data integrity issues, as user management is compromised. The vulnerability has a CVSS 3.1 base score of 7.1, reflecting high severity due to its network attack vector, low complexity, and lack of required user interaction. No known exploits are currently reported in the wild, but the flaw has been publicly disclosed and patched in version 0.16.3. Organizations running vulnerable versions should prioritize upgrading to mitigate risks.

Potential Impact

The primary impact of this vulnerability is denial of service through deletion of administrative and other user accounts, which can prevent legitimate access to the Frigate NVR system. This disruption can halt video surveillance monitoring and recording, critical for security operations in organizations relying on IP cameras. Additionally, the integrity of user management is compromised, potentially allowing attackers to manipulate account configurations or remove audit trails. The vulnerability affects confidentiality less directly but may facilitate further attacks by disabling administrative oversight. Because the flaw can be exploited by users with viewer privileges without user interaction, it lowers the barrier for insider threats or compromised low-privilege accounts to cause significant operational damage. Organizations in sectors such as physical security, critical infrastructure monitoring, and enterprise surveillance are particularly at risk, as disruption of video recording can impact incident response and safety.

Mitigation Recommendations

The definitive mitigation is to upgrade Frigate to version 0.16.3 or later, where the authorization checks have been corrected. Until upgrading is possible, organizations should restrict viewer role assignments to trusted users only and monitor user account deletions closely. Implement network segmentation to limit access to the Frigate management interface, ensuring only authorized personnel can connect. Employ strong authentication and logging to detect unusual account management activities. Additionally, consider deploying compensating controls such as multi-factor authentication for administrative accounts and regular backups of user configurations to enable recovery from unauthorized deletions. Security teams should review access control policies and conduct audits to verify that least privilege principles are enforced.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T20:35:49.926Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bd194ce32a4fbe5f4ea6bc

Added to database: 3/20/2026, 9:54:20 AM

Last enriched: 3/20/2026, 10:08:48 AM

Last updated: 3/20/2026, 10:55:52 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses