<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Tinyice — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/tinyice/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 17:21:12 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/tinyice/feed.xml" rel="self" type="application/rss+xml"/><item><title>TinyIce Unauthenticated WebRTC Stream Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-tinyice-webrtc-injection/</link><pubDate>Mon, 18 May 2026 17:21:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-tinyice-webrtc-injection/</guid><description>TinyIce versions 0.8.95 through 2.4.1 are vulnerable to unauthenticated stream injection due to a missing authentication check on the WebRTC ingest endpoint (/webrtc/source-offer), allowing a network attacker to hijack broadcasts by publishing arbitrary audio/video to a target mount, replacing the legitimate source's content; patched in version 2.5.0 (CVE-2026-45327).</description><content:encoded><![CDATA[<p>TinyIce, a lightweight streaming server, contains a vulnerability that allows unauthenticated users to inject streams into existing mounts. The vulnerability, present in versions 0.8.95 through 2.4.1, stems from a missing authentication check on the <code>/webrtc/source-offer</code> endpoint. Introduced on 2026-02-21, this flaw enables attackers to bypass the intended source password protection and inject arbitrary audio/video content into live broadcasts. This poses a significant threat to the integrity of broadcasts, as attackers can replace legitimate content with malicious or disruptive material. Patched in version 2.5.0, this vulnerability (CVE-2026-45327) requires immediate attention from TinyIce users to prevent potential broadcast hijacking.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target mount point on a TinyIce server. Mount names are often public, appearing in directory listings, player URLs, and YP listings.</li>
<li>The attacker crafts a malicious SDP (Session Description Protocol) offer for a WebRTC connection.</li>
<li>The attacker sends an HTTP POST request to the <code>/webrtc/source-offer</code> endpoint, including the target mount point as a query parameter (<code>?mount=&lt;mount&gt;</code>) and the malicious SDP offer in the request body.</li>
<li>The vulnerable TinyIce server, lacking authentication, processes the malicious SDP offer via <code>WebRTCManager.HandleSourceOffer</code>.</li>
<li>The server establishes a WebRTC peer connection with the attacker.</li>
<li>The attacker publishes arbitrary audio (Opus) and video (H.264) tracks via the established WebRTC connection.</li>
<li>The TinyIce server broadcasts the attacker&rsquo;s injected audio/video content to all listeners subscribed to the target mount point.</li>
<li>Listeners receive the attacker&rsquo;s injected stream instead of the legitimate source&rsquo;s content, resulting in a broadcast hijack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to inject arbitrary audio and video content into live broadcasts, effectively hijacking the stream. This can be used to broadcast silence, disruptive noise, malicious content, or competitor branding. While the legitimate publisher can attempt to re-establish their session, the attacker can immediately reconnect, leading to a sustained broadcast hijack until manual intervention occurs. The CVSS 3.1 base score is 7.4 (High), emphasizing the potential for significant integrity impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade TinyIce to version 2.5.0 or later to apply the patch that fixes CVE-2026-45327.</li>
<li>Implement the workaround by blocking <code>POST /webrtc/source-offer</code> at the reverse proxy to prevent unauthorized access to the vulnerable endpoint.</li>
<li>Deploy the Sigma rule &ldquo;Detect TinyIce WebRTC Unauthenticated SDP Offer&rdquo; to identify potential exploitation attempts in webserver logs.</li>
<li>Deploy the Sigma rule &ldquo;Detect TinyIce Authentication Failure for WebRTC Source&rdquo; to monitor for failed authentication attempts after patching or applying workarounds.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>webrtc</category><category>stream-injection</category><category>missing-authentication</category></item></channel></rss>