CVE-2026-28412: CWE-400: Uncontrolled Resource Consumption in textream
Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server imposes no limit on concurrent connections. Combined with a broadcast timer that sends state to all connected clients every 100 ms, an attacker can exhaust CPU and memory by flooding the server with connections, causing the Textream application to freeze and crash during a live session. Version 1.5.1 fixes the issue.
AI Analysis
Technical Summary
CVE-2026-28412 is an uncontrolled resource consumption vulnerability (CWE-400) affecting Textream, a free teleprompter application for macOS. The flaw exists in the DirectorServer WebSocket server component, which prior to version 1.5.1, imposes no restrictions on the number of concurrent client connections. The server uses a broadcast timer that sends state updates to all connected clients every 100 milliseconds. An attacker can exploit this by opening a large number of WebSocket connections simultaneously, causing the server to repeatedly send state data to an excessive number of clients. This results in rapid exhaustion of CPU and memory resources on the host system. The resource exhaustion leads to the Textream application freezing or crashing, particularly disruptive during live teleprompter sessions. The vulnerability requires no privileges or authentication but does require the attacker to initiate multiple WebSocket connections, which involves user interaction. The CVSS v3.1 base score is 6.5 (medium), reflecting the high impact on availability but no impact on confidentiality or integrity. The issue is resolved in Textream version 1.5.1 by implementing limits on concurrent WebSocket connections, preventing resource exhaustion. No known exploits are reported in the wild as of the publication date.
Potential Impact
This vulnerability primarily impacts the availability of the Textream application during live teleprompter sessions. Organizations relying on Textream for presentations, broadcasts, or live events may experience application freezes or crashes, disrupting operations and causing potential reputational damage. The denial-of-service condition could delay or halt critical communications, especially in media, education, or corporate environments where teleprompters are used. Since the attack requires no authentication and can be performed remotely over the network, it increases the risk of opportunistic or targeted disruption. However, the impact is limited to the affected application and does not compromise data confidentiality or integrity. The scope is confined to macOS systems running vulnerable versions of Textream, limiting broader systemic impact. Nonetheless, the disruption of live sessions can have significant operational consequences for affected users worldwide.
Mitigation Recommendations
The primary mitigation is to upgrade Textream to version 1.5.1 or later, which includes fixes that impose limits on concurrent WebSocket connections, preventing resource exhaustion. Until upgrading, organizations should consider network-level controls such as rate limiting or firewall rules to restrict the number of simultaneous WebSocket connections to the DirectorServer component. Monitoring system resource usage during teleprompter sessions can help detect abnormal spikes indicative of an attack. Implementing application-layer WebSocket connection throttling or authentication mechanisms could further reduce risk. Users should avoid exposing the DirectorServer WebSocket port to untrusted networks or the public internet. Additionally, educating users about the risk of connecting to untrusted clients or networks during live sessions can reduce attack vectors. Regularly reviewing and applying vendor security updates is essential to maintain protection.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Netherlands, Sweden
CVE-2026-28412: CWE-400: Uncontrolled Resource Consumption in textream
Description
Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server imposes no limit on concurrent connections. Combined with a broadcast timer that sends state to all connected clients every 100 ms, an attacker can exhaust CPU and memory by flooding the server with connections, causing the Textream application to freeze and crash during a live session. Version 1.5.1 fixes the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-28412 is an uncontrolled resource consumption vulnerability (CWE-400) affecting Textream, a free teleprompter application for macOS. The flaw exists in the DirectorServer WebSocket server component, which prior to version 1.5.1, imposes no restrictions on the number of concurrent client connections. The server uses a broadcast timer that sends state updates to all connected clients every 100 milliseconds. An attacker can exploit this by opening a large number of WebSocket connections simultaneously, causing the server to repeatedly send state data to an excessive number of clients. This results in rapid exhaustion of CPU and memory resources on the host system. The resource exhaustion leads to the Textream application freezing or crashing, particularly disruptive during live teleprompter sessions. The vulnerability requires no privileges or authentication but does require the attacker to initiate multiple WebSocket connections, which involves user interaction. The CVSS v3.1 base score is 6.5 (medium), reflecting the high impact on availability but no impact on confidentiality or integrity. The issue is resolved in Textream version 1.5.1 by implementing limits on concurrent WebSocket connections, preventing resource exhaustion. No known exploits are reported in the wild as of the publication date.
Potential Impact
This vulnerability primarily impacts the availability of the Textream application during live teleprompter sessions. Organizations relying on Textream for presentations, broadcasts, or live events may experience application freezes or crashes, disrupting operations and causing potential reputational damage. The denial-of-service condition could delay or halt critical communications, especially in media, education, or corporate environments where teleprompters are used. Since the attack requires no authentication and can be performed remotely over the network, it increases the risk of opportunistic or targeted disruption. However, the impact is limited to the affected application and does not compromise data confidentiality or integrity. The scope is confined to macOS systems running vulnerable versions of Textream, limiting broader systemic impact. Nonetheless, the disruption of live sessions can have significant operational consequences for affected users worldwide.
Mitigation Recommendations
The primary mitigation is to upgrade Textream to version 1.5.1 or later, which includes fixes that impose limits on concurrent WebSocket connections, preventing resource exhaustion. Until upgrading, organizations should consider network-level controls such as rate limiting or firewall rules to restrict the number of simultaneous WebSocket connections to the DirectorServer component. Monitoring system resource usage during teleprompter sessions can help detect abnormal spikes indicative of an attack. Implementing application-layer WebSocket connection throttling or authentication mechanisms could further reduce risk. Users should avoid exposing the DirectorServer WebSocket port to untrusted networks or the public internet. Additionally, educating users about the risk of connecting to untrusted clients or networks during live sessions can reduce attack vectors. Regularly reviewing and applying vendor security updates is essential to maintain protection.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-27T15:33:57.289Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a5b6a132ffcdb8a25206aa
Added to database: 3/2/2026, 4:11:13 PM
Last enriched: 3/9/2026, 5:24:06 PM
Last updated: 4/15/2026, 8:02:49 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.