CVE-2019-25342

7.5 HIGH

📋 TL;DR

CVE-2019-25342 is a denial of service vulnerability in Centova Cast that allows attackers to overwhelm the system by repeatedly calling the database export API endpoint. Attackers can trigger 100% CPU load by sending multiple concurrent requests with crafted parameters. This affects all Centova Cast 3.2.12 installations with the API enabled.

💻 Affected Systems

Products:
  • Centova Cast
Versions: 3.2.12
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations with the API enabled (default in most configurations).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption with 100% CPU utilization, making the Centova Cast server unresponsive and potentially affecting other services on the same host.

🟠

Likely Case

Service degradation or temporary unavailability of the Centova Cast web interface and streaming services until the attack stops or system is restarted.

🟢

If Mitigated

Minimal impact if rate limiting, API authentication, or network controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires no authentication. Attack can be automated with simple scripts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.2.13 or later

Vendor Advisory: https://centova.com

Restart Required: Yes

Instructions:

1. Download latest Centova Cast version from vendor. 2. Backup current installation. 3. Apply update following vendor instructions. 4. Restart Centova Cast services.

🔧 Temporary Workarounds

Rate Limit API Endpoint

linux

Implement rate limiting on /api.php endpoint to prevent excessive requests

# Using iptables for Linux: iptables -A INPUT -p tcp --dport 80 -m limit --limit 10/min --limit-burst 20 -j ACCEPT
# Using web server config (Apache): LimitRequestBody 102400
# Using web server config (Nginx): limit_req_zone $binary_remote_addr zone=api:10m rate=10r/s;

Disable API Endpoint

all

Temporarily disable the vulnerable API endpoint if not required

# Rename or move api.php file: mv /path/to/centova/api.php /path/to/centova/api.php.disabled
# Or block access in web server config: <Location /api.php> Deny from all </Location>

🧯 If You Can't Patch

  • Implement strict network access controls to limit API endpoint access to trusted IPs only
  • Deploy a web application firewall (WAF) with rate limiting and DoS protection rules

🔍 How to Verify

Check if Vulnerable:

Check Centova Cast version in admin interface or via command: grep 'version' /path/to/centova/version.txt

Check Version:

cat /path/to/centova/version.txt || grep -i version /path/to/centova/*.php

Verify Fix Applied:

Verify version is 3.2.13 or later and test API endpoint with multiple concurrent requests to ensure no CPU spike

📡 Detection & Monitoring

Log Indicators:

  • High frequency of requests to /api.php endpoint
  • CPU utilization spikes in system logs
  • Multiple concurrent connections from single IP

Network Indicators:

  • Burst of HTTP POST requests to /api.php
  • Unusual traffic patterns to API endpoint

SIEM Query:

source="web_access.log" AND uri="/api.php" AND count by src_ip > 100 per 60s

🔗 References

📤 Share & Export