{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T05:48:51.772","vulnerabilities":[{"cve":{"id":"CVE-2026-33470","sourceIdentifier":"security-advisories@github.com","published":"2026-03-26T17:16:41.320","lastModified":"2026-03-31T12:58:02.200","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Frigate is a network video recorder (NVR) with realtime local object detection for IP cameras. In version 0.17.0, a low-privilege authenticated user restricted to one camera can access snapshots from other cameras. This is possible through a chain of two authorization problems: `/api/timeline` returns timeline entries for cameras outside the caller's allowed camera set, then `/api/events/{event_id}/snapshot-clean.webp` declares `Depends(require_camera_access)` but never actually validates `event.camera` after looking up the event. Together, this allows a restricted user to enumerate event IDs from unauthorized cameras and then fetch clean snapshots for those events. Version 0.17.1 fixes the issue."},{"lang":"es","value":"Frigate es un grabador de vídeo en red (NVR) con detección local de objetos en tiempo real para cámaras IP. En la versión 0.17.0, un usuario autenticado con bajos privilegios restringido a una cámara puede acceder a instantáneas de otras cámaras. Esto es posible a través de una cadena de dos problemas de autorización: `/api/timeline` devuelve entradas de la línea de tiempo para cámaras fuera del conjunto de cámaras permitidas del llamador, luego `/api/events/{event_id}/snapshot-clean.webp` declara `Depends(require_camera_access)` pero nunca valida realmente `event.camera` después de buscar el evento. Juntos, esto permite a un usuario restringido enumerar IDs de eventos de cámaras no autorizadas y luego obtener instantáneas limpias para esos eventos. La versión 0.17.1 corrige el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"},{"lang":"en","value":"CWE-863"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:frigate:frigate:0.17.0:*:*:*:*:*:*:*","matchCriteriaId":"FB927AB9-39C9-4351-9838-750C739C0C59"}]}]}],"references":[{"url":"https://github.com/blakeblackshear/frigate/security/advisories/GHSA-m2mg-pj9p-2r7g","source":"security-advisories@github.com","tags":["Exploit","Mitigation","Vendor Advisory"]},{"url":"https://github.com/blakeblackshear/frigate/security/advisories/GHSA-m2mg-pj9p-2r7g","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Mitigation","Vendor Advisory"]}]}}]}