Impact
The vulnerability stems from a lack of limits on concurrent WebSocket connections to the DirectorServer. Coupled with a broadcast timer that pushes state updates every 100 ms to all clients, an attacker can flood the server with connections, causing the application to consume excessive CPU and memory and eventually freeze or crash during a live broadcast. This leads to a denial of service for the user running the teleprompter during critical sessions.
Affected Systems
The affected product is Textream, a macOS teleprompter application by the vendor f:. Versions prior to 1.5.1 are vulnerable; version 1.5.1 includes the fix that restricts the connection count.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium-to-high severity vulnerability, while the EPSS score of less than 1 % suggests that, at the time of analysis, exploitation is considered unlikely. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, as it relies on WebSocket connections that can be established from external clients. An attacker would need network access to the machine running Textream to initiate the flood of connections.
OpenCVE Enrichment