CVE-2022-50790

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to access live radio stream information from SOUND4 IMPACT/FIRST/PULSE/Eco systems. Attackers can exploit specific web scripts to disclose radio stream details without requiring any authentication. Organizations using affected SOUND4 products versions 2.x and below are vulnerable.

💻 Affected Systems

Products:
  • SOUND4 IMPACT
  • SOUND4 FIRST
  • SOUND4 PULSE
  • SOUND4 Eco
Versions: 2.x and below
Operating Systems: Not specified, likely embedded/application-specific
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects web interface components that handle radio stream management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map all radio streams, potentially identifying sensitive broadcast content, operational patterns, or using this information for further attacks against broadcast infrastructure.

🟠

Likely Case

Unauthorized access to radio stream metadata and potentially stream content, enabling information gathering about broadcast operations.

🟢

If Mitigated

Limited to information disclosure only if proper network segmentation and access controls prevent external access to vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simple HTTP requests to specific web scripts (webplay or ffmpeg). Public proof-of-concept details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.sound4.com/

Restart Required: No

Instructions:

Check vendor website for security updates. Consider upgrading to version 3.x or later if available.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to SOUND4 web interfaces to authorized IP addresses only

Authentication Enforcement

all

Implement reverse proxy with authentication in front of SOUND4 web interface

🧯 If You Can't Patch

  • Isolate SOUND4 systems on separate network segments with strict firewall rules
  • Monitor for unauthorized access attempts to webplay and ffmpeg scripts

🔍 How to Verify

Check if Vulnerable:

Attempt to access webplay or ffmpeg scripts without authentication. Example: curl http://[target]/webplay or similar endpoint.

Check Version:

Check product version in web interface or system configuration. Vendor-specific command not documented.

Verify Fix Applied:

Verify authentication is required for webplay/ffmpeg scripts and unauthorized access returns proper authentication error.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to webplay or ffmpeg scripts
  • Multiple failed authentication attempts followed by successful script access

Network Indicators:

  • HTTP requests to webplay/ffmpeg endpoints without authentication headers
  • Unusual traffic patterns to radio stream management interfaces

SIEM Query:

source_ip=* AND (url_path="*webplay*" OR url_path="*ffmpeg*") AND NOT auth_success=true

🔗 References

📤 Share & Export