CVE-2022-46901

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute database operations and system tasks via a websocket interface in Vocera Report Server and Voice Server. It affects healthcare organizations using vulnerable versions of these systems, potentially compromising patient data and system integrity.

💻 Affected Systems

Products:
  • Vocera Report Server
  • Vocera Voice Server
Versions: 5.x through 5.8
Operating Systems: Not specified in CVE
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the Report Console websocket interface which appears to be enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including database destruction, data exfiltration, and unauthorized system task execution leading to service disruption and data loss.

🟠

Likely Case

Unauthorized database manipulation, data theft, or system disruption through backup/restore/clear operations.

🟢

If Mitigated

Limited impact if proper network segmentation and authentication controls prevent access to the vulnerable interface.

🌐 Internet-Facing: HIGH if the websocket interface is exposed to the internet without authentication.
🏢 Internal Only: HIGH as the vulnerability allows unauthenticated access from any network segment that can reach the interface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthenticated access to database functions via websocket, suggesting straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 5.9 or later (based on typical patching patterns)

Vendor Advisory: https://www.stryker.com/us/en/about/governance/cyber-security/product-security/vocera-report-server-vulnerabilities--cve-2022-46898--cve-2022-4.html

Restart Required: Yes

Instructions:

1. Download the latest patch from Stryker's security portal. 2. Apply the patch following vendor instructions. 3. Restart the Vocera Report Server and Voice Server services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to the Vocera Report Console websocket interface using firewall rules.

iptables -A INPUT -p tcp --dport [websocket_port] -s [trusted_ips] -j ACCEPT
iptables -A INPUT -p tcp --dport [websocket_port] -j DROP

Web Application Firewall

all

Deploy a WAF to block unauthorized websocket connections to the vulnerable endpoint.

🧯 If You Can't Patch

  • Implement strict network access controls to isolate Vocera servers from untrusted networks.
  • Monitor websocket traffic for unauthorized database operation attempts and implement alerting.

🔍 How to Verify

Check if Vulnerable:

Check the Vocera Report Server and Voice Server version. If version is 5.0 through 5.8, the system is vulnerable.

Check Version:

Check the administration console or system logs for version information (vendor-specific command not provided in CVE).

Verify Fix Applied:

Verify the version is 5.9 or later and test that unauthenticated websocket connections to database functions are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated websocket connections to database functions
  • Unexpected database backup/restore/clear operations
  • System task execution from unauthenticated sources

Network Indicators:

  • Websocket traffic to Vocera Report Console on unusual ports
  • Database operation commands via websocket protocol

SIEM Query:

source="vocera*" AND (websocket OR database_operation) AND user="anonymous"

🔗 References

📤 Share & Export