CVE-2022-50696
CRITICAL
9,3
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
CRITICAL
9,8
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain hardcoded credentials embedded in server binaries that cannot be modified through normal device operations. Attackers can leverage these static credentials to gain unauthorized access to the device across Linux and Windows distributions without requiring user interaction.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0012
Percentile
0,3th
Updated
EPSS Score Trend (Last 77 Days)
798
Use of Hard-coded Credentials
DraftCommon Consequences
Security Scopes Affected:
Access Control
Integrity
Confidentiality
Availability
Other
Potential Impacts:
Bypass Protection Mechanism
Read Application Data
Gain Privileges Or Assume Identity
Execute Unauthorized Code Or Commands
Other
Applicable Platforms
Technologies:
Mobile, ICS/OT
Operating System
Wm2 Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:wm2_firmware:1.11:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Pulse Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:pulse_firmware:2.15:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Impact Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:impact_firmware:2.15:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Big Voice2 Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:big_voice2_firmware:1.30:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Impact Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:impact_firmware:1.69:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Impact Eco Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:impact_eco_firmware:1.16:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
First Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:first_firmware:1.69:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Pulse Eco Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:pulse_eco_firmware:1.16:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Big Voice4 Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:big_voice4_firmware:1.2:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application
Stream Extension by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:a:sound4:stream_extension:2.4.29:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Pulse Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:pulse_firmware:1.69:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
First Firmware by Sound4
CPE Identifier
View Detailed Analysis
cpe:2.3:o:sound4:first_firmware:2.15:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://exchange.xforce.ibmcloud.com/vulnerabilities/247949
https://packetstormsecurity.com/files/170256/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-…
https://www.sound4.com/
https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-hardcoded-cred…
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5729.php