{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50692","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-12-21T19:48:13.435Z","datePublished":"2025-12-30T22:41:33.949Z","dateUpdated":"2026-01-05T19:27:58.810Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2025-12-30T22:41:33.949Z"},"datePublic":"2022-12-14T00:00:00.000Z","title":"SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Insufficient Session Expiration Vulnerability","descriptions":[{"lang":"en","value":"SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain an insufficient session expiration vulnerability that allows attackers to reuse old session credentials. Attackers can exploit weak session management to potentially hijack active user sessions and gain unauthorized access to the application."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Insufficient Session Expiration","cweId":"CWE-613","type":"CWE"}]}],"affected":[{"vendor":"SOUND4 Ltd.","product":"Impact/Pulse/First","versions":[{"version":"Version 2: 1.1/2.15","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"Impact/Pulse Eco","versions":[{"version":"1.16","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"BigVoice4","versions":[{"version":"1.2","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"BigVoice2","versions":[{"version":"1.30","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"Stream","versions":[{"version":"1.1/2.4.29","status":"affected"}]},{"vendor":"Kantar Media","product":"WM2","versions":[{"version":"1.11","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5724.php","name":"Zero Science Lab Disclosure (ZSL-2022-5724)","tags":["third-party-advisory"]},{"url":"https://packetstormsecurity.com/files/170251/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-Insufficient-Session-Expiration.html","name":"Packet Storm Security Exploit Entry","tags":["exploit"]},{"url":"https://cxsecurity.com/issue/WLB-2022120030","name":"CXSecurity Vulnerability Listing","tags":["third-party-advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/247956","name":"IBM X-Force Vulnerability Exchange","tags":["vdb-entry"]},{"url":"https://www.sound4.com/","name":"SOUND4 Product Homepage","tags":["product"]},{"name":"VulnCheck Advisory: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Insufficient Session Expiration Vulnerability","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-insufficient-session-expiration-vulnerability"}],"credits":[{"lang":"en","value":"LiquidWorm as Gjoko Krstic of Zero Science Lab","type":"finder"}],"x_generator":{"engine":"vulncheck"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-05T19:27:51.531478Z","id":"CVE-2022-50692","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-01-05T19:27:58.810Z"}}]}}