Description
LIVE555 before 2026.04.22 contains an authorization bypass vulnerability in RTSP session command handling that allows attackers to replay valid Session tokens from unauthenticated connections. Attackers who obtain a valid Session token can issue PLAY and TEARDOWN commands from a second TCP connection without authentication, causing server crashes through virtual function call errors or disrupting active streams by terminating victim sessions.
Published: 2026-05-19
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

LIVE555 before 2026.04.22 contains a flaw in RTSP session command handling that allows an attacker to replay a valid Session token obtained through an unauthenticated connection. With a valid token, the attacker can issue PLAY and TEARDOWN commands from a second TCP connection without proper authorization, leading to server crashes via virtual function call errors or interruption of active streams. This results in loss of service continuity.

Affected Systems

The vulnerability affects Live Networks, Inc. LIVE555 software versions prior to 2026.04.22. Specific affected versions are not explicitly enumerated in the provided data, but any installation relying on a release older than 2026.04.22 is at risk.

Risk and Exploitability

The flaw scores a CVSS of 8.2, indicating high severity. The EPSS score is not available, so exact exploitation probability cannot be quantified, but the absence of a KEV listing suggests no confirmed widespread exploitation yet. Based on the description, the likely attack vector involves remote network access to an exposed RTSP server, where malicious actors can acquire a valid Session token and replay it from a separate connection. The risk is elevated for publicly reachable RTSP services due to the potential for authentication bypass and session termination attacks.

Generated by OpenCVE AI on May 19, 2026 at 20:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the LIVE555 RTSP Server to version 2026.04.22 or later to apply the vendor‑fixed authorization handling logic.
  • If upgrading is temporarily infeasible, restrict external network traffic to the RTSP port (e.g., results in a firewall rule for TCP port 554) or place the server behind a network segment that enforces authentication before allowing RTSP traffic.
  • Configure the server to require authentication for all RTSP commands, ensuring that session tokens cannot be accepted from unauthenticated connections.

Generated by OpenCVE AI on May 19, 2026 at 20:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Live Networks
Live Networks live555
Vendors & Products Live Networks
Live Networks live555

Tue, 19 May 2026 19:15:00 +0000

Type Values Removed Values Added
Description LIVE555 before 2026.04.22 contains an authorization bypass vulnerability in RTSP session command handling that allows attackers to replay valid Session tokens from unauthenticated connections. Attackers who obtain a valid Session token can issue PLAY and TEARDOWN commands from a second TCP connection without authentication, causing server crashes through virtual function call errors or disrupting active streams by terminating victim sessions.
Title LIVE555 < 2026.04.22 RTSP Server Authorization Bypass via Session Token
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Live Networks Live555
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-20T14:04:14.447Z

Reserved: 2026-04-20T16:07:47.311Z

Link: CVE-2026-41470

cve-icon Vulnrichment

Updated: 2026-05-20T14:04:03.337Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T19:16:50.440

Modified: 2026-05-19T21:08:41.030

Link: CVE-2026-41470

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T10:39:04Z

Weaknesses