CVE-2025-62382

7.7 HIGH

📋 TL;DR

CVE-2025-62382 is a path traversal vulnerability in Frigate NVR that allows authenticated users to read arbitrary files on the host system. Attackers can exfiltrate sensitive configuration files, secrets, or user data by abusing the video export thumbnail feature. This affects all Frigate installations prior to version 0.16.2.

💻 Affected Systems

Products:
  • Frigate NVR
Versions: All versions prior to 0.16.2
Operating Systems: All platforms running Frigate
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated API access. The vulnerability exists in the export workflow feature.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Frigate appliance with exfiltration of all sensitive files including secrets, configuration, and user data, potentially leading to lateral movement in the network.

🟠

Likely Case

Exfiltration of sensitive configuration files and secrets from the Frigate host, compromising the NVR system and potentially exposing camera credentials.

🟢

If Mitigated

Limited impact with proper network segmentation and strict access controls limiting authenticated user access.

🌐 Internet-Facing: HIGH if Frigate API is exposed to the internet, as authenticated attackers can exploit this remotely.
🏢 Internal Only: MEDIUM to HIGH depending on internal threat model and user access controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated API access and involves a race condition during file copying. The vulnerability is straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.16.2

Vendor Advisory: https://github.com/blakeblackshear/frigate/security/advisories/GHSA-8gv4-5jr9-v96j

Restart Required: Yes

Instructions:

1. Backup Frigate configuration. 2. Update Frigate to version 0.16.2 or later using your deployment method (Docker, manual install, etc.). 3. Restart Frigate service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict API Access

linux

Limit access to Frigate API to trusted users only using network controls or authentication middleware.

Use firewall rules to restrict access: iptables -A INPUT -p tcp --dport 5000 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 5000 -j DROP

Disable Export Feature

all

Disable the export workflow feature if not required.

Edit Frigate config.yml and remove or comment export-related configurations

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Frigate from sensitive systems
  • Apply principle of least privilege to Frigate service account and file permissions

🔍 How to Verify

Check if Vulnerable:

Check Frigate version: docker exec frigate cat /VERSION or check web UI. If version is below 0.16.2, system is vulnerable.

Check Version:

docker exec frigate cat /VERSION 2>/dev/null || grep version /config/config.yml

Verify Fix Applied:

Verify Frigate version is 0.16.2 or higher. Test export functionality with controlled paths to ensure path traversal is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in export logs
  • Multiple failed export attempts with unusual paths
  • Access to sensitive file paths in system logs

Network Indicators:

  • Unusual outbound traffic from Frigate host
  • Large data transfers from Frigate API endpoints

SIEM Query:

source="frigate" AND (event="export" AND path CONTAINS "../") OR (event="file_access" AND path NOT LIKE "/media/%")

🔗 References

📤 Share & Export