CVE-2022-50696
Hardcoded Credentials in SOUND4 IMPACT Servers Enable Unauthorized Access
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sound4 | pulse | * |
| sound4 | first | * |
| sound4 | impact | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves hardcoded credentials embedded in the server binaries of SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below. These credentials cannot be changed through normal device operations. Attackers can exploit these static credentials to gain unauthorized access to the device on both Linux and Windows systems without needing any user interaction.
How can this vulnerability impact me? :
The vulnerability allows attackers to gain unauthorized access to affected devices remotely without user interaction. This could lead to unauthorized control or access to sensitive functions or data on the device, potentially compromising security and privacy.