CVE-2021-46701

7.2 HIGH

📋 TL;DR

CVE-2021-46701 is a WebSocket transport vulnerability in PreMiD 2.2.0 that allows unauthorized access to socket events. Attackers can intercept and manipulate Discord 'now playing' status updates, potentially spoofing or interfering with a victim's media activity display. This affects users running the vulnerable PreMiD version with Discord integration enabled.

💻 Affected Systems

Products:
  • PreMiD
Versions: 2.2.0
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PreMiD to be running with Discord integration active. The vulnerability exists in the WebSocket transport implementation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could manipulate a victim's Discord status to display inappropriate content, potentially causing reputational damage or social engineering attacks against the victim's contacts.

🟠

Likely Case

Attackers interfere with Discord status updates, causing incorrect 'now playing' information or temporary disruption of the PreMiD service.

🟢

If Mitigated

With proper network segmentation and updated software, impact is limited to potential minor annoyance from status display issues.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the victim's PreMiD WebSocket endpoint. Proof of concept exists in GitHub issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.2.1 and later

Vendor Advisory: https://github.com/PreMiD/PreMiD/issues/790

Restart Required: Yes

Instructions:

1. Open PreMiD application. 2. Check for updates in settings or allow auto-update. 3. Restart PreMiD after update completes. 4. Verify version is 2.2.1 or higher.

🔧 Temporary Workarounds

Disable PreMiD

all

Temporarily disable PreMiD application to prevent exploitation

Close PreMiD application from system tray/notification area

Network Isolation

all

Block WebSocket connections to PreMiD from untrusted networks

Configure firewall to block external connections to PreMiD WebSocket port

🧯 If You Can't Patch

  • Disable PreMiD Discord integration in settings
  • Use PreMiD only on trusted, isolated networks

🔍 How to Verify

Check if Vulnerable:

Check PreMiD version in application settings. If version is exactly 2.2.0, system is vulnerable.

Check Version:

PreMiD shows version in application settings interface (no CLI command available)

Verify Fix Applied:

Verify PreMiD version is 2.2.1 or higher in application settings.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected WebSocket connection attempts to PreMiD
  • Unusual Discord status update patterns

Network Indicators:

  • Unauthorized WebSocket traffic to PreMiD default port
  • Suspicious WebSocket message patterns

SIEM Query:

websocket AND (premid OR discord) AND (unauthorized OR unexpected)

🔗 References

📤 Share & Export