{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50696","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-12-21T19:48:13.436Z","datePublished":"2025-12-30T22:41:35.214Z","dateUpdated":"2026-03-04T19:29:55.372Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-01-16T18:59:59.439Z"},"datePublic":"2022-12-14T00:00:00.000Z","title":"SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Hardcoded Credentials Authentication Bypass","descriptions":[{"lang":"en","value":"SOUND4 IMPACT/FIRST/PULSE/Eco versions 2.x and below contain hardcoded credentials embedded in server binaries that cannot be modified through normal device operations. Attackers can leverage these static credentials to gain unauthorized access to the device across Linux and Windows distributions without requiring user interaction."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Use of Hard-coded Credentials","cweId":"CWE-798","type":"CWE"}]}],"affected":[{"vendor":"SOUND4 Ltd.","product":"Impact/Pulse/First","versions":[{"version":"Version 2: 1.1/2.15","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"Impact/Pulse Eco","versions":[{"version":"1.16","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"BigVoice4","versions":[{"version":"1.2","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"BigVoice2","versions":[{"version":"1.30","status":"affected"}]},{"vendor":"SOUND4 Ltd.","product":"Stream","versions":[{"version":"1.1/2.4.29","status":"affected"}]},{"vendor":"Kantar Media","product":"WM2","versions":[{"version":"1.11","status":"affected"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5729.php","name":"Zero Science Lab Disclosure (ZSL-2022-5729)","tags":["third-party-advisory"]},{"url":"https://packetstormsecurity.com/files/170256/SOUND4-IMPACT-FIRST-PULSE-Eco-2.x-Hardcoded-Credentials.html","name":"Packet Storm Security Exploit Details","tags":["exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/247949","name":"IBM X-Force Vulnerability Exchange Entry","tags":["vdb-entry"]},{"url":"https://www.sound4.com/","name":"SOUND4 Product Homepage","tags":["product"]},{"name":"VulnCheck Advisory: SOUND4 IMPACT/FIRST/PULSE/Eco <=2.x Hardcoded Credentials Authentication Bypass","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/sound-impactfirstpulseeco-x-hardcoded-credentials-authentication-bypass"}],"credits":[{"lang":"en","value":"LiquidWorm as Gjoko Krstic of Zero Science Lab","type":"finder"}],"x_generator":{"engine":"vulncheck"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-04T19:29:43.261231Z","id":"CVE-2022-50696","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-04T19:29:55.372Z"}}]}}