CVE-2016-20033
Awaiting Analysis Awaiting Analysis - Queue
Local Privilege Escalation in Wowza Streaming Engine via File Permission Flaw

Publication date: 2026-03-16

Last updated on: 2026-03-19

Assigner: VulnCheck

Description
Wowza Streaming Engine 4.5.0 contains a local privilege escalation vulnerability that allows authenticated users to escalate privileges by replacing executable files due to improper file permissions granting full access to the Everyone group. Attackers can replace the nssm_x64.exe binary in the manager and engine service directories with malicious executables to execute code with LocalSystem privileges when services restart.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-16
Last Modified
2026-03-19
Generated
2026-05-06
AI Q&A
2026-03-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wowza streaming_engine 4.5.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2016-20033 is a local privilege escalation vulnerability in Wowza Streaming Engine version 4.5.0. It occurs because executable files, specifically nssm_x64.exe in the manager and engine service directories, have improper file permissions that grant full control to the Everyone group. This allows any authenticated user to replace these executables with malicious binaries.

When the affected services restart, the malicious executable runs with LocalSystem privileges, enabling the attacker to execute code with elevated rights. The vulnerability is further worsened by an unquoted service path issue, which can allow execution of unintended binaries placed in certain directories.


How can this vulnerability impact me? :

This vulnerability allows an authenticated local user to escalate their privileges to LocalSystem level by replacing legitimate executables with malicious ones. This means an attacker with basic access can gain full control over the system, potentially leading to unauthorized code execution, system compromise, and complete takeover of the affected machine.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking the file permissions of the executable files nssm_x64.exe located in the bin and manager\\bin directories of the Wowza Streaming Engine installation. Specifically, you should verify if these files have full control permissions granted to the Everyone group, which is insecure.'}, {'type': 'paragraph', 'content': 'Additionally, you can check for unquoted service paths for the Windows services WowzaStreamingEngine450 and WowzaStreamingEngineManager450, as this is part of the vulnerability.'}, {'type': 'list_item', 'content': 'Use the command `icacls` on Windows to check permissions, for example: `icacls "C:\\Path\\To\\Wowza\\bin\\nssm_x64.exe"` and `icacls "C:\\Path\\To\\Wowza\\manager\\bin\\nssm_x64.exe"`.'}, {'type': 'list_item', 'content': 'Use the command `sc qc WowzaStreamingEngine450` and `sc qc WowzaStreamingEngineManager450` to query the service configuration and check if the binary path is unquoted.'}, {'type': 'paragraph', 'content': 'If the permissions show full control for Everyone or the service paths are unquoted, the system is vulnerable.'}] [1, 3]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation steps include correcting the file permissions on the affected executable files to remove full control from the Everyone group and restrict access to only necessary system accounts.'}, {'type': 'paragraph', 'content': 'Additionally, you should fix the unquoted service path vulnerability by ensuring that the service executable paths are properly quoted in the Windows service configuration.'}, {'type': 'list_item', 'content': 'Use the `icacls` command to remove or restrict permissions, for example: `icacls "C:\\Path\\To\\Wowza\\bin\\nssm_x64.exe" /remove:g Everyone` or set more restrictive permissions.'}, {'type': 'list_item', 'content': 'Use the `sc` command or registry editor to update the service binary path to include quotes, for example: `sc config WowzaStreamingEngine450 binPath= "\\"C:\\Path\\To\\Wowza\\bin\\nssm_x64.exe\\""`.'}, {'type': 'paragraph', 'content': 'Restart the affected services after applying these changes to ensure the fixes take effect.'}] [1, 2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart