SOUND4 Server Service 4.1.102 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted binary path by inserting malicious code in the system root path that could execute with LocalSystem privileges during service startup.

Project Subscriptions

Vendors Products
Big Voice Subscribe
Big Voice Firmware Subscribe
First Firmware Subscribe
Impact Eco Subscribe
Impact Eco Firmware Subscribe
Impact Firmware Subscribe
Ip Connect Subscribe
Ip Connect Firmware Subscribe
Playout Ula8 Subscribe
Playout Ula8 Firmware Subscribe
Pulse Eco Subscribe
Pulse Eco Firmware Subscribe
Pulse Firmware Subscribe
Server Service Subscribe
Stream X2 Subscribe
Stream X2 Firmware Subscribe
Stream X4 Subscribe
Stream X4 Firmware Subscribe
Stream X8 Subscribe
Stream X8 Firmware Subscribe
Voice Ula2 Subscribe
Voice Ula2 Firmware Subscribe
Voice Ula4 Subscribe
Voice Ula4 Firmware Subscribe
Voice Ula8 Subscribe
Voice Ula8 Firmware Subscribe
Wm2 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 29 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Sound4 big Voice
Sound4 big Voice Firmware
Sound4 first
Sound4 first Firmware
Sound4 impact
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 ip Connect
Sound4 ip Connect Firmware
Sound4 playout Ula8
Sound4 playout Ula8 Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream X2
Sound4 stream X2 Firmware
Sound4 stream X4
Sound4 stream X4 Firmware
Sound4 stream X8
Sound4 stream X8 Firmware
Sound4 voice Ula2
Sound4 voice Ula2 Firmware
Sound4 voice Ula4
Sound4 voice Ula4 Firmware
Sound4 voice Ula8
Sound4 voice Ula8 Firmware
Sound4 wm2
Sound4 wm2 Firmware
CPEs cpe:2.3:h:sound4:big_voice:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:ip_connect:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:playout_ula8:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x2:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x4:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x8:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula2:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula4:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula8:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:big_voice_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:first_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_eco_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:ip_connect_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:playout_ula8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_eco_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:stream_x2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:stream_x4_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:stream_x8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:voice_ula2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:voice_ula4_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:voice_ula8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:wm2_firmware:4.1.102:*:*:*:*:*:*:*
Vendors & Products Sound4 big Voice
Sound4 big Voice Firmware
Sound4 first
Sound4 first Firmware
Sound4 impact
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 ip Connect
Sound4 ip Connect Firmware
Sound4 playout Ula8
Sound4 playout Ula8 Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream X2
Sound4 stream X2 Firmware
Sound4 stream X4
Sound4 stream X4 Firmware
Sound4 stream X8
Sound4 stream X8 Firmware
Sound4 voice Ula2
Sound4 voice Ula2 Firmware
Sound4 voice Ula4
Sound4 voice Ula4 Firmware
Sound4 voice Ula8
Sound4 voice Ula8 Firmware
Sound4 wm2
Sound4 wm2 Firmware

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Sound4
Sound4 server Service
Vendors & Products Sound4
Sound4 server Service

Mon, 22 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description SOUND4 Server Service 4.1.102 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted binary path by inserting malicious code in the system root path that could execute with LocalSystem privileges during service startup.
Title SOUND4 Server Service 4.1.102 Local Privilege Escalation via Unquoted Service Path
Weaknesses CWE-428
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-22T22:05:26.914Z

Reserved: 2025-12-19T14:03:57.725Z

Link: CVE-2023-53965

cve-icon Vulnrichment

Updated: 2025-12-22T21:59:57.561Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-22T22:16:01.027

Modified: 2026-01-29T16:11:32.350

Link: CVE-2023-53965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-23T22:39:57Z

Weaknesses