Description
SOUND4 Server Service 4.1.102 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted binary path by inserting malicious code in the system root path that could execute with LocalSystem privileges during service startup.
Published: 2025-12-22
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Sound4 big Voice
Sound4 big Voice Firmware
Sound4 first
Sound4 first Firmware
Sound4 impact
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 ip Connect
Sound4 ip Connect Firmware
Sound4 playout Ula8
Sound4 playout Ula8 Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream X2
Sound4 stream X2 Firmware
Sound4 stream X4
Sound4 stream X4 Firmware
Sound4 stream X8
Sound4 stream X8 Firmware
Sound4 voice Ula2
Sound4 voice Ula2 Firmware
Sound4 voice Ula4
Sound4 voice Ula4 Firmware
Sound4 voice Ula8
Sound4 voice Ula8 Firmware
Sound4 wm2
Sound4 wm2 Firmware
CPEs cpe:2.3:h:sound4:big_voice:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:ip_connect:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:playout_ula8:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x2:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x4:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x8:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula2:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula4:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula8:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:big_voice_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:first_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_eco_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:ip_connect_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:playout_ula8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_eco_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:stream_x2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:stream_x4_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:stream_x8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:voice_ula2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:voice_ula4_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:voice_ula8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:wm2_firmware:4.1.102:*:*:*:*:*:*:*
Vendors & Products Sound4 big Voice
Sound4 big Voice Firmware
Sound4 first
Sound4 first Firmware
Sound4 impact
Sound4 impact Eco
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 ip Connect
Sound4 ip Connect Firmware
Sound4 playout Ula8
Sound4 playout Ula8 Firmware
Sound4 pulse
Sound4 pulse Eco
Sound4 pulse Eco Firmware
Sound4 pulse Firmware
Sound4 stream X2
Sound4 stream X2 Firmware
Sound4 stream X4
Sound4 stream X4 Firmware
Sound4 stream X8
Sound4 stream X8 Firmware
Sound4 voice Ula2
Sound4 voice Ula2 Firmware
Sound4 voice Ula4
Sound4 voice Ula4 Firmware
Sound4 voice Ula8
Sound4 voice Ula8 Firmware
Sound4 wm2
Sound4 wm2 Firmware

Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Sound4
Sound4 server Service
Vendors & Products Sound4
Sound4 server Service

Mon, 22 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description SOUND4 Server Service 4.1.102 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted binary path by inserting malicious code in the system root path that could execute with LocalSystem privileges during service startup.
Title SOUND4 Server Service 4.1.102 Local Privilege Escalation via Unquoted Service Path
Weaknesses CWE-428
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Sound4 Big Voice Big Voice Firmware First First Firmware Impact Impact Eco Impact Eco Firmware Impact Firmware Ip Connect Ip Connect Firmware Playout Ula8 Playout Ula8 Firmware Pulse Pulse Eco Pulse Eco Firmware Pulse Firmware Server Service Stream X2 Stream X2 Firmware Stream X4 Stream X4 Firmware Stream X8 Stream X8 Firmware Voice Ula2 Voice Ula2 Firmware Voice Ula4 Voice Ula4 Firmware Voice Ula8 Voice Ula8 Firmware Wm2 Wm2 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-22T22:05:26.914Z

Reserved: 2025-12-19T14:03:57.725Z

Link: CVE-2023-53965

cve-icon Vulnrichment

Updated: 2025-12-22T21:59:57.561Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-22T22:16:01.027

Modified: 2026-01-29T16:11:32.350

Link: CVE-2023-53965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-23T22:39:57Z

Weaknesses