FLIR Systems AX8 Cameras Command Injection (CVE-2022-4364)

critical Tenable OT Security Plugin ID 505195

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A vulnerability has been found in Teledyne FLIR AX8 up to 1.46.16.
Affected by this issue is some unknown functionality of the file palette.php of the component Web Service Handler. The manipulation of the argument palette leads to command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.49.16 can resolve this issue. Upgrading the affected component is advised. The vendor points out: FLIR AX8 internal web site has been refactored to be able to handle the reported vulnerabilities.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://www.nessus.org/u?63571f1c

https://vuldb.com/?ctiid.215118

https://vuldb.com/?id.215118

https://vuldb.com/?submit.55748

Plugin Details

Severity: Critical

ID: 505195

File Name: tenable_ot_flirsystems_CVE-2022-4364.nasl

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 2/19/2026

Updated: 2/19/2026

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:flir:flir_ax8_firmware

Required KB Items: Tenable.ot/FLIRSystems

Exploit Ease: No known exploits are available

Patch Publication Date: 12/8/2022

Vulnerability Publication Date: 12/8/2022

Reference Information

CVE: CVE-2022-4364

CWE: 74, 77, 78