Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28412: CWE-400: Uncontrolled Resource Consumption in textream

0
Medium
VulnerabilityCVE-2026-28412cvecve-2026-28412cwe-400
Published: Mon Mar 02 2026 (03/02/2026, 15:46:56 UTC)
Source: CVE Database V5
Product: textream

Description

Textream is a free macOS teleprompter app. Prior to version 1.5.1, the `DirectorServer` WebSocket server imposes no limit on concurrent connections. Combined with a broadcast timer that sends state to all connected clients every 100 ms, an attacker can exhaust CPU and memory by flooding the server with connections, causing the Textream application to freeze and crash during a live session. Version 1.5.1 fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 17:24:06 UTC

Technical Analysis

CVE-2026-28412 is an uncontrolled resource consumption vulnerability (CWE-400) affecting Textream, a free teleprompter application for macOS. The flaw exists in the DirectorServer WebSocket server component, which prior to version 1.5.1, imposes no restrictions on the number of concurrent client connections. The server uses a broadcast timer that sends state updates to all connected clients every 100 milliseconds. An attacker can exploit this by opening a large number of WebSocket connections simultaneously, causing the server to repeatedly send state data to an excessive number of clients. This results in rapid exhaustion of CPU and memory resources on the host system. The resource exhaustion leads to the Textream application freezing or crashing, particularly disruptive during live teleprompter sessions. The vulnerability requires no privileges or authentication but does require the attacker to initiate multiple WebSocket connections, which involves user interaction. The CVSS v3.1 base score is 6.5 (medium), reflecting the high impact on availability but no impact on confidentiality or integrity. The issue is resolved in Textream version 1.5.1 by implementing limits on concurrent WebSocket connections, preventing resource exhaustion. No known exploits are reported in the wild as of the publication date.

Potential Impact

This vulnerability primarily impacts the availability of the Textream application during live teleprompter sessions. Organizations relying on Textream for presentations, broadcasts, or live events may experience application freezes or crashes, disrupting operations and causing potential reputational damage. The denial-of-service condition could delay or halt critical communications, especially in media, education, or corporate environments where teleprompters are used. Since the attack requires no authentication and can be performed remotely over the network, it increases the risk of opportunistic or targeted disruption. However, the impact is limited to the affected application and does not compromise data confidentiality or integrity. The scope is confined to macOS systems running vulnerable versions of Textream, limiting broader systemic impact. Nonetheless, the disruption of live sessions can have significant operational consequences for affected users worldwide.

Mitigation Recommendations

The primary mitigation is to upgrade Textream to version 1.5.1 or later, which includes fixes that impose limits on concurrent WebSocket connections, preventing resource exhaustion. Until upgrading, organizations should consider network-level controls such as rate limiting or firewall rules to restrict the number of simultaneous WebSocket connections to the DirectorServer component. Monitoring system resource usage during teleprompter sessions can help detect abnormal spikes indicative of an attack. Implementing application-layer WebSocket connection throttling or authentication mechanisms could further reduce risk. Users should avoid exposing the DirectorServer WebSocket port to untrusted networks or the public internet. Additionally, educating users about the risk of connecting to untrusted clients or networks during live sessions can reduce attack vectors. Regularly reviewing and applying vendor security updates is essential to maintain protection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:33:57.289Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5b6a132ffcdb8a25206aa

Added to database: 3/2/2026, 4:11:13 PM

Last enriched: 3/9/2026, 5:24:06 PM

Last updated: 4/15/2026, 8:02:49 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses