CVE-2022-50792
Unauthenticated File Disclosure in SOUND4 IMPACT/PULSE 2.x
Publication date: 2025-12-30
Last updated on: 2025-12-30
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sound4 | impact | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below, where an unauthenticated attacker can exploit a file disclosure flaw. By manipulating the 'file' GET parameter, the attacker can remotely access arbitrary sensitive system files on the affected device without needing any authentication.
How can this vulnerability impact me? :
The vulnerability allows remote attackers to access sensitive system files without authentication, which can lead to exposure of confidential information, potential system compromise, and further exploitation. This can severely impact the security and integrity of the affected system.