CVE-2025-28235

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to retrieve administrator credentials in plaintext from Soundcraft Ui Series digital mixers via the /socket.io/1/websocket/ endpoint. Attackers can gain administrative access to the device, potentially taking full control. Affected devices include Ui12 and Ui16 models running vulnerable firmware versions.

💻 Affected Systems

Products:
  • Soundcraft Ui12
  • Soundcraft Ui16
Versions: Firmware v1.0.7x and v1.0.5x
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices must have web interface enabled and accessible via network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the mixer, allowing them to modify all audio settings, disrupt live events, install malicious firmware, or use the device as a pivot point into connected networks.

🟠

Likely Case

Attackers steal administrator credentials and gain unauthorized access to the mixer's web interface, potentially disrupting audio operations or changing critical settings.

🟢

If Mitigated

With proper network segmentation and access controls, attackers cannot reach the vulnerable endpoint, limiting impact to isolated incidents.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the device's web interface on port 80/443.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Soundcraft/Harman Professional website for firmware updates. If available, download and install via device web interface.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Soundcraft Ui devices on separate VLAN with strict access controls.

Access Control Lists

all

Implement firewall rules to restrict access to device web interface to authorized IPs only.

🧯 If You Can't Patch

  • Disable web interface if not required for operations
  • Change administrator password regularly and monitor for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Access https://[device-ip]/socket.io/1/websocket/ and check if credentials are exposed in plaintext responses.

Check Version:

Check firmware version in device web interface under Settings > System Information

Verify Fix Applied:

Verify the endpoint no longer returns plaintext credentials after applying vendor patches or workarounds.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login from unusual IP
  • Access to /socket.io/1/websocket/ endpoint

Network Indicators:

  • Unusual traffic to device port 80/443 from unauthorized sources
  • HTTP requests to /socket.io/1/websocket/

SIEM Query:

source_ip=* AND dest_port IN (80,443) AND url_path="/socket.io/1/websocket/"

🔗 References

📤 Share & Export