FKIE_CVE-2023-53965

Vulnerability from fkie_nvd - Published: 2025-12-22 22:16 - Updated: 2026-01-29 16:11
Summary
SOUND4 Server Service 4.1.102 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted binary path by inserting malicious code in the system root path that could execute with LocalSystem privileges during service startup.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:impact_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E70884-24F6-46C3-97BE-93AED751BF6B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:impact:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF502CEB-F8A3-4161-B78A-338F3108A1CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:pulse_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF69B79F-EE2B-4729-B3DD-611BDD6FA0B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:pulse:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EF56652-B226-4487-9757-F3114DAD358E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:first_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "B922347D-A2D6-4198-B679-19D9214CB4C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:first:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ECA96F8-4038-4257-84DA-9D17BA0A9198",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:impact_eco_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAC64E89-392E-4F15-B8E7-8E252BBA5BA4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4B0A611-C50E-4397-ACDF-8D090D4AFC88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:pulse_eco_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA715E1D-8136-4FF8-AF14-DBA96A9DB5E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71E155FD-162E-4EA9-9BD9-89384B3AD175",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:big_voice_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "035BBBC0-C9F3-4139-8B29-DFE3D5592350",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:big_voice:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD2E9A8-22CA-424F-BA32-DF28A4E1321F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:voice_ula2_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8B2EB3A-58D1-4A25-AEFD-CE48EDC607A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:voice_ula2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33D972CD-FD11-4856-AE4C-9DBE1D66A4E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:voice_ula4_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "350F2E22-AC74-43DC-86F5-76ED08BFCBE9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:voice_ula4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9202182-A3C7-495F-BC52-37681131A9F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:voice_ula8_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4624510-A2C9-49CB-A32B-412139246940",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:voice_ula8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C62FD67C-2F89-4BDA-A8F7-088EC08A1FC1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:ip_connect_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "4676E944-523D-4A74-88EB-403F819ED8E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:ip_connect:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E3CCF25-20FF-432D-8E9E-A2DDBFB681CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:wm2_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1D09D53-22B8-4662-A894-4FB5BCD4C7B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED8E14DD-2C04-4080-AAE9-6D770436AC6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:stream_x2_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "57286B3B-62D8-4E46-935D-CFA67DCB17AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:stream_x2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C630D7E-C2CF-4D9A-80B8-7043E28B3BF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:stream_x4_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1551CE2-B783-4895-A751-9B1C3F40FB55",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:stream_x4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F07D37E6-43F0-407A-B0F0-04B9014E9626",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:stream_x8_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99D3F1-11C0-48B4-9963-61FC35C12241",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:stream_x8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D78DEB52-89D1-4A0F-808C-78B638020E1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:sound4:playout_ula8_firmware:4.1.102:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4799D50-72B6-41FE-A409-6D12650850CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:sound4:playout_ula8:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AB3706D-7E81-478B-9B35-4391AA0F8979",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SOUND4 Server Service 4.1.102 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted binary path by inserting malicious code in the system root path that could execute with LocalSystem privileges during service startup."
    }
  ],
  "id": "CVE-2023-53965",
  "lastModified": "2026-01-29T16:11:32.350",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.5,
        "impactScore": 5.9,
        "source": "disclosure@vulncheck.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "LOW",
          "attackRequirements": "NONE",
          "attackVector": "LOCAL",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "NONE",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "NONE",
          "subIntegrityImpact": "NONE",
          "userInteraction": "NONE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "HIGH",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "HIGH",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "disclosure@vulncheck.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2025-12-22T22:16:01.027",
  "references": [
    {
      "source": "disclosure@vulncheck.com",
      "tags": [
        "Product"
      ],
      "url": "https://web.archive.org/web/20221207074555/https://www.sound4.com/"
    },
    {
      "source": "disclosure@vulncheck.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://www.exploit-db.com/exploits/51167"
    },
    {
      "source": "disclosure@vulncheck.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.vulncheck.com/advisories/sound-server-service-local-privilege-escalation-via-unquoted-service-path"
    },
    {
      "source": "disclosure@vulncheck.com",
      "tags": [
        "Third Party Advisory",
        "Exploit"
      ],
      "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5721.php"
    },
    {
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "tags": [
        "Third Party Advisory",
        "Exploit"
      ],
      "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5721.php"
    }
  ],
  "sourceIdentifier": "disclosure@vulncheck.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-428"
        }
      ],
      "source": "disclosure@vulncheck.com",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…