CVE-2024-52052

7.2 HIGH

📋 TL;DR

This vulnerability allows authenticated Wowza Streaming Engine Manager administrators to define malicious custom application properties that can poison stream targets, leading to remote code execution with high privileges. It affects Wowza Streaming Engine installations below version 4.9.1 where administrators have access to the Streaming Engine Manager interface.

💻 Affected Systems

Products:
  • Wowza Streaming Engine
Versions: All versions below 4.9.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated administrator access to the Streaming Engine Manager interface. The vulnerability exists in the application property configuration functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining high-privilege remote code execution, potentially leading to data theft, service disruption, or lateral movement within the network.

🟠

Likely Case

Authenticated administrators (including compromised accounts) could execute arbitrary code on the streaming server, potentially disrupting streaming services or accessing sensitive configuration data.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to authorized administrators who would need to intentionally exploit the vulnerability.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated administrator access and knowledge of the streaming engine configuration. The vulnerability involves poisoning stream targets through custom application properties.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.1

Vendor Advisory: https://www.wowza.com/docs/wowza-streaming-engine-4-9-1-release-notes

Restart Required: Yes

Instructions:

1. Download Wowza Streaming Engine 4.9.1 from the official website. 2. Backup current configuration and data. 3. Stop the Wowza service. 4. Install the 4.9.1 update following vendor instructions. 5. Restart the Wowza service. 6. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit access to the Streaming Engine Manager interface to only essential personnel and implement strong authentication controls.

Monitor Application Property Changes

all

Implement logging and monitoring for changes to custom application properties in the Streaming Engine Manager.

🧯 If You Can't Patch

  • Implement strict access controls for administrator accounts and monitor for suspicious activity in the Streaming Engine Manager.
  • Segment the Wowza server from critical network resources and implement network-based intrusion detection for RCE attempts.

🔍 How to Verify

Check if Vulnerable:

Check the Wowza Streaming Engine version in the administration interface or configuration files. If version is below 4.9.1, the system is vulnerable.

Check Version:

Check the version in the Wowza administration web interface at http://[server]:8088/enginemanager or examine the VERSION.txt file in the Wowza installation directory.

Verify Fix Applied:

After updating, verify the version shows 4.9.1 or higher in the administration interface or by checking the installation directory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to custom application properties
  • Administrator account activity outside normal hours
  • Error logs related to stream target processing

Network Indicators:

  • Unexpected outbound connections from the Wowza server
  • Suspicious payloads in streaming protocol traffic

SIEM Query:

source="wowza.logs" AND (event="property_modified" OR event="configuration_change") AND user="admin"

🔗 References

📤 Share & Export