VYPR
Medium severity5.9NVD Advisory· Published May 19, 2026· Updated May 19, 2026

CVE-2026-41470

CVE-2026-41470

Description

LIVE555 before 2026.04.22 contains an authorization bypass vulnerability in RTSP session command handling that allows attackers to replay valid Session tokens from unauthenticated connections. Attackers who obtain a valid Session token can issue PLAY and TEARDOWN commands from a second TCP connection without authentication, causing server crashes through virtual function call errors or disrupting active streams by terminating victim sessions.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

LIVE555 RTSP server before 2026.04.22 allows unauthenticated replay of Session tokens to issue PLAY/TEARDOWN commands, causing denial of service.

Vulnerability

LIVE555 RTSP server versions from v2025.01.17 through v2026.04.01 (verified range) contain an authorization bypass in session command handling [1]. The server accepts a valid Session: token on a second TCP connection without requiring authentication, allowing replay of commands like PLAY and TEARDOWN [1][2]. The fix is in v2026.04.22 [3].

Exploitation

An attacker must first obtain a valid Session: token from an authenticated SETUP request (e.g., by sniffing or social engineering) [1]. The attacker then opens a new unauthenticated TCP connection to the server and sends a PLAY or TEARDOWN request with the stolen token. The server responds with RTSP/1.0 200 OK and then crashes due to a stale callback pointer [1]. No authentication is required on the second connection.

Impact

Successful exploitation allows an attacker to disrupt active RTSP streams by terminating victim sessions or cause a denial of service via server crash (signal 11, exit code 139) [1]. The crash is a memory/lifetime safety failure; no code execution or information disclosure has been demonstrated [1][2]. The CVSS v3 score is 5.9 (Medium) [2].

Mitigation

Upgrade to LIVE555 v2026.04.22 or later, which adds authentication checks in PLAY, TEARDOWN, and PAUSE handlers, returning 401 Unauthorized on replay attempts [1][3]. No workaround is available for earlier versions. The fixed version is available from the official download site [3].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.