CVE-2022-46898

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to perform path traversal attacks via the 'restore SQL data' filename in Vocera Report Server and Voice Server. By exploiting improper filename sanitization, attackers can escape the intended restoration directory and execute arbitrary SQL commands against the database. Organizations using affected Vocera products are at risk.

💻 Affected Systems

Products:
  • Vocera Report Server
  • Vocera Voice Server
Versions: 5.x through 5.8
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the Report Console's websocket function for database restoration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the database leading to data theft, data manipulation, or full system takeover via SQL injection.

🟠

Likely Case

Unauthorized database access allowing data exfiltration or modification of critical healthcare information.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH - WebSocket function accessible via web interface could be exploited remotely.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the restoration function but path traversal payloads are well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 5.9 or later

Vendor Advisory: https://www.stryker.com/us/en/about/governance/cyber-security/product-security/vocera-report-server-vulnerabilities--cve-2022-46898--cve-2022-4.html

Restart Required: Yes

Instructions:

1. Download Vocera Report Server/Voice Server version 5.9 or later from Stryker. 2. Backup current configuration and data. 3. Install the updated version following vendor documentation. 4. Restart services to apply changes.

🔧 Temporary Workarounds

Disable Database Restoration Function

all

Temporarily disable the websocket function that allows database restoration until patching is complete.

Consult Vocera documentation for specific service/function disablement procedures

Network Access Restrictions

all

Restrict network access to the Vocera Report Console to only authorized administrative systems.

Configure firewall rules to limit access to specific IP addresses

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Vocera servers from other critical systems
  • Enable detailed logging and monitoring for any database restoration attempts

🔍 How to Verify

Check if Vulnerable:

Check current version in Vocera administration interface. If version is 5.8 or earlier, system is vulnerable.

Check Version:

Check via Vocera web administration interface or consult system documentation

Verify Fix Applied:

Verify version is 5.9 or later in administration interface and test restoration function with controlled inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database restoration attempts
  • Websocket connections with path traversal patterns in filenames
  • SQL errors from unexpected file paths

Network Indicators:

  • Websocket traffic to restoration endpoints with unusual payloads
  • Database connections from Vocera server with unexpected queries

SIEM Query:

source="vocera_logs" AND (event="database_restoration" OR event="websocket_connection") AND (filename="*../*" OR filename="*..\\*")

🔗 References

📤 Share & Export