CVE-2022-50792

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to read arbitrary files on SOUND4 IMPACT/FIRST/PULSE/Eco devices without authentication by manipulating the 'file' GET parameter. Attackers can access sensitive system files including configuration files, passwords, and other critical data. All users running affected versions are vulnerable.

💻 Affected Systems

Products:
  • SOUND4 IMPACT
  • SOUND4 FIRST
  • SOUND4 PULSE
  • SOUND4 Eco
Versions: 2.x and below
Operating Systems: Embedded/Linux-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through disclosure of credentials, configuration files, and sensitive data leading to further attacks on the network.

🟠

Likely Case

Disclosure of sensitive configuration files, passwords, and system information that could enable lateral movement or additional attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers to directly access sensitive files from the internet.
🏢 Internal Only: HIGH - Even internally, unauthenticated access to sensitive files poses significant risk to network security.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP requests with manipulated parameters. Public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.sound4.com/

Restart Required: No

Instructions:

Contact SOUND4 vendor for updated firmware. Check vendor website for security advisories and patches.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to SOUND4 devices using firewalls or network segmentation

Web Application Firewall

all

Deploy WAF rules to block requests containing directory traversal patterns

🧯 If You Can't Patch

  • Isolate affected devices in separate network segments with strict firewall rules
  • Implement network monitoring for suspicious file access patterns to affected devices

🔍 How to Verify

Check if Vulnerable:

Test by sending HTTP GET request with file parameter containing path traversal (e.g., GET /endpoint?file=../../etc/passwd)

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

Attempt exploitation after applying vendor patches or workarounds to confirm vulnerability is mitigated

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests with 'file' parameter containing '../' patterns
  • Unusual file access patterns from external IPs

Network Indicators:

  • HTTP GET requests with path traversal sequences in parameters
  • Multiple failed file access attempts

SIEM Query:

source="web_logs" AND (uri_query="*file=*../*" OR uri_query="*file=*..%2f*")

🔗 References

📤 Share & Export