Alta Video —1667: Ava cameras were vulnerable to DoS via TCP SYN flood
Release Date
17th of July 2025.
Overview
A vulnerability allowing denial-of-service (DoS) attacks via TCP SYN flood was discovered in Ava cameras. The vulnerability stemmed from the absence of TCP SYN cookie mitigation in the kernel. Successful exploitation could result in the temporary unavailability of services on targeted ports during the attack.
Affected Products
- Avigilon Cloud-Native Cameras:
- All Stable upgrade Channel versions before 7.5.5.
- All Beta upgrade channel versions before 7.5.0.
Unaffected Products
Alta Video: all versions.
Avigilon Cloud-Native Cameras:
- All Stable upgrade channel versions after and including 7.5.5.
- All Beta upgrade channel versions after and including 7.5.0.
Alta Video Cloud: all versions.
Resolution
This issue has been fixed in Avigilon Cloud-Native Cameras Beta upgrade channel version 7.5.0 and Stable upgrade channel version 7.5.5.
It is strongly recommended that all Avigilon Cloud-Native camera installations running an affected version upgrade to the latest release as soon as possible. Releases are available to download through the Alta Video User Interface for Avigilon Cloud-Native cameras and the Avigilon Cloud-Native Camera Interface for unmanaged cameras.
Vulnerability Information
- CVSSv3 score: 6.5 (Medium)
- CVSSv3 vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Mitigations
There are no known mitigations for this issue.
Work arounds
There are no known work arounds for this issue.
Acknowledgements
Issue reported internally by Alta Video.
Disclosure Timeline
- 15/10/2024 Issue found
- 20/02/2025 Root cause established
- 20/02/2025 Fix identified
- 10/04/2025 Patched Avigilon Cloud-Native Cameras (Beta upgrade channel) released
- 19/05/2025 Patched Avigilon Cloud-Native Cameras (Stable upgrade channel) released
- 17/07/2025 Vulnerability publicly disclosed