356
VMScore

CVE-2021-35492

Published: 05/10/2021 Updated: 12/07/2022
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P

Vulnerability Summary

Wowza Streaming Engine up to and including 4.8.11+5 could allow an authenticated, remote malicious user to exhaust filesystem resources via the /enginemanager/server/vhost/historical.jsdata vhost parameter. This is due to the insufficient management of available filesystem resources. An attacker could exploit this vulnerability through the Virtual Host Monitoring section by requesting random virtual-host historical data and exhausting available filesystem resources. A successful exploit could allow the malicious user to cause database errors and cause the device to become unresponsive to web-based management. (Manual intervention is required to free filesystem resources and return the application to an operational state.)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wowza streaming engine

Github Repositories

Denial of Service tool for Wowza Streaming Engine <= 4.8.11+5 - Uncontrolled Resource Consumption (CVE-2021-35492)

Exploit Information Exploit Title: Wowza Streaming Engine 4811+5 - Denial of Service CVE: CVE-2021-35492 Date: 2021-10-06 Exploit Author: N4nj0 Software Link: wwwwowzacom/products/streaming-engine Version: 4811+5 Tested on: Wowza Streaming Engine &lt;= 4811+5 Vulnerability Advisory: n4nj0githubio/advisories/wowza-streaming-engine-i/ TWowza Streamin