CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Description
Wowza Streaming Engine 4.5.0 contains a privilege escalation vulnerability that allows authenticated read-only users to elevate privileges to administrator by manipulating POST parameters. Attackers can send POST requests to the user edit endpoint with accessLevel set to 'admin' and advUser parameters set to 'true' and 'on' to gain administrative access.
Analysis
A privilege escalation vulnerability in Wowza Streaming Engine 4.5.0 allows authenticated read-only users to elevate their privileges to administrator level by manipulating POST parameters (accessLevel='admin', advUser='true'/'on') sent to the user edit endpoint. A public exploit is available on exploit-db, though the vulnerability has not been added to CISA's KEV catalog, suggesting limited real-world exploitation despite the high CVSS score of 8.8.
Technical Context
The vulnerability affects Wowza Streaming Engine, a media server software for streaming video and audio content. According to the CPE identifier (cpe:2.3:a:wowza_media_systems,_llc.:wowza_streaming_engine:*:*:*:*:*:*:*:*), multiple versions may be affected beyond just 4.5.0. The root cause is CWE-352 (Cross-Site Request Forgery), indicating the application fails to properly validate that requests to modify user privileges originate from legitimate sources, allowing attackers to forge requests that elevate privileges without proper authorization checks.
Affected Products
Wowza Streaming Engine 4.5.0 is confirmed affected per ENISA EUVD-2016-10823. The CPE string uses wildcards (*), suggesting other versions may also be vulnerable. The vendor is Wowza Media Systems, LLC. Users should verify with the vendor advisory at http://www.zeroscience.mk/en/vulnerabilities/ZSL-2016-5340.php for a complete list of affected versions.
Remediation
Upgrade Wowza Streaming Engine to a patched version newer than 4.5.0 (specific patch version not provided in references). As an immediate workaround, restrict access to the user management interface to trusted administrators only, implement additional authentication layers, or use network segmentation to limit access. Monitor user privilege changes in logs. Consult the vendor advisory and VulnCheck advisory (https://www.vulncheck.com/advisories/wowza-streaming-engine-privilege-escalation-via-user-edit) for detailed remediation guidance.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2016-10823