← Advisories

FLIR Systems FLIR Thermal Traffic Cameras Websocket Device Manipulation

Critical
Advisory ID
ZSL-2018-5490
Release Date
06 October 2018
Vendor
FLIR Systems, Inc. - https://www.flir.com
Affected Version
V1.01-0bb5b27 - (TrafiOne) - Codename: TrafiOne, E1.00.09 - (TI BPL2 EDGE) - Codename: TIIP4EDGE, V1.02.P01 - (TI x-stream) - Codename: TIIP2, V1.05.P01 - (ThermiCam) - Codename: ThermiCam, V1.04.P02 - (ThermiCam) - Codename: ThermiCam, V1.04 - (ThermiCam) - Codename: ThermiCam, V1.01.P02 - (ThermiCam) - Codename: ThermiCam, V1.05.P03 - (TrafiSense) - Codename: TrafiSense, V1.06 - (VIP-IP) - Codename: VIP-IP, V1.02.P02 - (TrafiRadar) - Codename: TrafiRadar
Tested On
nginx/1.12.1, nginx/1.10.2, nginx/1.8.0, Websocket/13 (RFC 6455)
Summary

FLIR TrafiOne is an all-round detection sensor for traffic monitoring and dynamic traffic signal control. Offered in a compact and affordable package, the FLIR TrafiOne uses thermal imaging and Wi-Fi technology to adapt traffic signals based on the presence detection of vehicles, bicycles and pedestrians while at the same time generating high resolution data at intersections and in urban environments. FLIR TrafiOne helps traffic engineers to improve traffic flows, reduce vehicle idling time, monitor congestion, enhance safety for vulnerable road users, collect data and measure travel and delay times for different transport modes.

FLIR TrafiCam is a vehicle presence sensor that combines a CMOS camera and a video detector in a single unit. FLIR TrafiCam detects moving and stationary vehicles at signalized intersections. Via detection outputs or via IP protocol, vehicle presence information is transmitted to the traffic controller so that signal timing can be adjusted dynamically. This way, vehicle waiting time at traffic lights is reduced and traffic flows are optimized.

FLIR TrafiSense is an integrated thermal sensor and detector for vehicle and bike detection. TrafiSense does not need light to operate, but uses the thermal energy emitted from vehicles and bicyclists. This enables the sensor to detect vehicles and bikes in the darkest of nights, over a long range and in the most difficult weather conditions. The result is reliable, 24/7 traffic detection for a wide range of applications.

FLIR TrafiRadar vehicle presence sensor is a combination of a video sensor and radar. TrafiRadar is typically used for stop bar and advance vehicle presence detection, traffic adaptive systems, and dilemma-zone protection and thus improves traffic safety and efficiency at signalized intersections. TrafiRadar will warn traffic light controllers whenever a vehicle is present in the dilemma zone, either extending green or red lights to improve overall safety.and stationary vehicles at signalized intersections and collect traffic data at intersections or interurban roads. Via detection outputs or via IP protocol, vehicle presence information is transmitted to the traffic controller so that signal timing can be adjusted dynamically. TrafiCam x-stream offers streaming video at full frame rate, to be used for traffic monitoring in a control room.

The VIP series offers multi-functional Video Image Processing modules for traffic control. VIP boards integrate automatic incident detection, data collection, recording of pre and post incident image sequences and streaming video in one board. VIP modules have been installed for road and tunnel projects all over the world.

Description

FLIR thermal traffic cameras suffer from an unauthenticated device manipulation vulnerability utilizing the websocket protocol. The affected FLIR Intelligent Transportation Systems - ITS models use an insecure implementation of websocket communication used for administering the device. Authentication and authorization bypass via referencing a direct object allows an attacker to directly modify running configurations, disclose information or initiate a denial of service (DoS) scenario with Reboot command. The devices do not support the usage of TLS 'wss://' prefix for WebSocket Secure connection making the network traffic disclosed in plain-text to MitM evil-doers. Also, the web service has an Origin validation security issue and is vulnerable to Cross-Site WebSocket Hijacking (CSWSH).

Proof of Concept
Disclosure Timeline
26.07.2018Vulnerability discovered.
17.08.2018Vendor contacted.
17.08.2018Vendor replied forwarding message to appropriate team.
21.08.2018Vendor responds asking more details.
22.08.2018Replied to the vendor requesting PGP key.
23.08.2018Vendor sends PGP key.
27.08.2018Sent details to the vendor.
29.08.2018Vendor confirms the issues developing patches.
29.08.2018Working with the vendor.
17.09.2018Vendor releases new firmware updates to address these issues.
06.10.2018Coordinated public security advisory released.
Credits
Vulnerability discovered by Gjoko Krstic
References
Changelog
06.10.2018Initial release
09.10.2018Added reference [3], [4], [5], [6] and [7]
11.10.2018Added reference [8]
15.10.2018Added reference [9]
23.03.2026Added reference [10]