CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4DescriptionNVD
A vulnerability was found in Teledyne FLIR FB-Series O and FLIR FH-Series ID 1.3.2.16 and classified as critical. Affected by this issue is some unknown functionality of the file /priv/production/production.html of the component Production Tools. The manipulation leads to improper access controls. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AnalysisAI
CVE-2025-7576 is a critical improper access control vulnerability affecting Teledyne FLIR thermal imaging devices (FB-Series O and FH-Series) running firmware version 1.3.2.16 and earlier. An unauthenticated remote attacker can exploit the vulnerable /priv/production/production.html endpoint to gain unauthorized access with low complexity, potentially reading, modifying, or disrupting system availability. Public exploit code exists and the vendor has not responded to disclosure, increasing real-world exploitation risk.
Technical ContextAI
The vulnerability resides in the Production Tools component of FLIR thermal camera firmware, specifically within the web-accessible /priv/production/production.html file. The root cause is classified under CWE-266 (Incorrect Privilege Assignment), indicating the application fails to enforce proper privilege boundaries or access control lists on production management functionality. The affected devices are network-connected thermal imaging systems (Teledyne FLIR FB-Series O and FH-Series) that expose administrative or sensitive production interfaces via HTTP/HTTPS without adequate authentication or authorization checks. CPE context: These are embedded systems running firmware where the web service processes production-related configurations or system state without validating caller privileges.
RemediationAI
Immediate actions: (1) Update to firmware version > 1.3.2.16 once available from Teledyne FLIR (vendor has not yet provided patches; monitor official FLIR security advisories); (2) Network isolation: Restrict network access to the thermal imaging devices using firewall rules—block inbound HTTP/HTTPS traffic to port 80/443 except from trusted administrative networks; (3) Disable web interface if not required, or require VPN/bastion host access; (4) Implement network segmentation to isolate thermal imaging systems from general corporate networks; (5) Monitor device logs for unauthorized access to /priv/production/production.html endpoints (HTTP 200 responses from unauthorized IPs). Contact Teledyne FLIR support directly to request security updates and risk clarification.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-21317