Last month, the TIM’s Red Team Research (RTR) disclosed 2 new vulnerabilities affecting the Oracle Business Intelligence product with High severity. Today, the TIM’s Red Team Research led by Massimiliano Brolli, discovered 4 new vulnerabilities that have been addressed by the manufacturer WOWZA Streaming Engine, between the end of 2019 and July 2020.
Wowza Streaming Engine (known as Wowza Media Server) is a unified streaming media server software developed by Wowza Media Systems based in Colorado, in the United States of America and used by many US government entities such as NASA, US Air force, Boeing, New York Police Department and many other clients around the world.
The vulnerabilities discovered by the team, tracked as CVE-2019-19454, CVE-2019-19455, CVE-2019-19453 and CVE-2019-19456, are an “Arbitrary File Download”, “Path traversal” and 2 “Cross-site Scripting” (the first two with High Severity and the others with Medium one) respectively. The issues were discovered during laboratory tests, promptly managed in a CVD (Coordinated Vulnerability Disclosure) process with the vendor.
Some of these vulnerabilities can be chained together by a remote attacker to execute arbitrary code on the impacted system, they can also provide full access to all the data it contains, through the user interface.
The laboratory has been active for less than a year (based on the registered CVE) and unknown vulnerabilities have already been identified on various products including NOKIA, Selesta, and Oracle. The research team has identified a total of 16 new published CVEs, as reported on the NVD (National Vulnerability Database) and on TIM’s Corporate website, available at https://www.gruppotim.it/redteam.
TIM is one of the very few Italian industrial realities to conduct research of undocumented vulnerabilities, for this reason I suggest you to follow them carefully.
(SecurityAffairs – hacking, WOWZA Streaming Engine)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.