CVE-2024-5168

9.8 CRITICAL

📋 TL;DR

An improper access control vulnerability in Prodys' Quantum Audio codec allows unauthenticated attackers to bypass authentication entirely and execute arbitrary API requests against the web application. This affects versions 2.3.4t and below, potentially compromising any system running vulnerable software.

💻 Affected Systems

Products:
  • Prodys Quantum Audio codec
Versions: 2.3.4t and below
Operating Systems: Not specified
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with affected versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing data theft, ransomware deployment, or destruction of critical infrastructure.

🟠

Likely Case

Unauthorized access to sensitive data, manipulation of audio processing systems, or service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Authentication bypass suggests straightforward exploitation once endpoint discovery is achieved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version above 2.3.4t

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/improper-access-control-vulnerability-prodys-quantum-audio-codec

Restart Required: Yes

Instructions:

1. Contact Prodys for updated version. 2. Backup current configuration. 3. Install patched version. 4. Restart service. 5. Verify authentication controls are functioning.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to vulnerable systems using firewalls or network segmentation.

Web Application Firewall

all

Deploy WAF with rules to block unauthorized API requests and authentication bypass attempts.

🧯 If You Can't Patch

  • Isolate vulnerable systems from internet and restrict internal network access.
  • Implement strict monitoring for unauthorized API requests and authentication failures.

🔍 How to Verify

Check if Vulnerable:

Check installed version of Prodys Quantum Audio codec. If version is 2.3.4t or lower, system is vulnerable.

Check Version:

Check application documentation or configuration files for version information.

Verify Fix Applied:

After patching, attempt to access API endpoints without authentication. All requests should be denied.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API requests succeeding
  • Authentication bypass attempts
  • Unusual API activity from unauthenticated sources

Network Indicators:

  • API requests without authentication headers
  • Unusual traffic patterns to codec endpoints

SIEM Query:

source="prodys_codec" AND (status="200" AND auth="none")

🔗 References

📤 Share & Export