Home

Description

LIVE555 before 2026.04.22 contains an authorization bypass vulnerability in RTSP session command handling that allows attackers to replay valid Session tokens from unauthenticated connections. Attackers who obtain a valid Session token can issue PLAY and TEARDOWN commands from a second TCP connection without authentication, causing server crashes through virtual function call errors or disrupting active streams by terminating victim sessions.

PUBLISHED Reserved 2026-04-20 | Published 2026-05-19 | Updated 2026-05-20 | Assigner VulnCheck




HIGH: 8.2CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

MEDIUM: 5.9CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Incorrect Authorization

Product status

Default status
affected

Any version before 2026.04.22
affected

Credits

Younghyo Cho @ CIS Lab., Seoultech finder

VulnCheck coordinator

References

gist.github.com/yhcho0405/ee9b67a96808ef19f22e8a4ee88c795f technical-description exploit

download.live555.com/ patch product

www.vulncheck.com/...-authorization-bypass-via-session-token third-party-advisory

cve.org (CVE-2026-41470)

nvd.nist.gov (CVE-2026-41470)

Download JSON