Alta Video —1667: Ava cameras were vulnerable to DoS via TCP SYN flood

Release Date

17th of July 2025.

Overview

A vulnerability allowing denial-of-service (DoS) attacks via TCP SYN flood was discovered in Ava cameras. The vulnerability stemmed from the absence of TCP SYN cookie mitigation in the kernel. Successful exploitation could result in the temporary unavailability of services on targeted ports during the attack.

Affected Products

  • Avigilon Cloud-Native Cameras:
    • All Stable upgrade Channel versions before 7.5.5.
    • All Beta upgrade channel versions before 7.5.0.

Unaffected Products

  • Alta Video: all versions.

  • Avigilon Cloud-Native Cameras:

    • All Stable upgrade channel versions after and including 7.5.5.
    • All Beta upgrade channel versions after and including 7.5.0.
  • Alta Video Cloud: all versions.

Resolution

This issue has been fixed in Avigilon Cloud-Native Cameras Beta upgrade channel version 7.5.0 and Stable upgrade channel version 7.5.5.

It is strongly recommended that all Avigilon Cloud-Native camera installations running an affected version upgrade to the latest release as soon as possible. Releases are available to download through the Alta Video User Interface for Avigilon Cloud-Native cameras and the Avigilon Cloud-Native Camera Interface for unmanaged cameras.

Vulnerability Information

Mitigations

There are no known mitigations for this issue.

Work arounds

There are no known work arounds for this issue.

Acknowledgements

Issue reported internally by Alta Video.

Disclosure Timeline

  • 15/10/2024 Issue found
  • 20/02/2025 Root cause established
  • 20/02/2025 Fix identified
  • 10/04/2025 Patched Avigilon Cloud-Native Cameras (Beta upgrade channel) released
  • 19/05/2025 Patched Avigilon Cloud-Native Cameras (Stable upgrade channel) released
  • 17/07/2025 Vulnerability publicly disclosed