CVE-2023-53965

SOUND4 Server Service 4.1.102 contains an unquoted service path vulnerability that allows local non-privileged users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted binary path by inserting malicious code in the system root path that could execute with LocalSystem privileges during service startup.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sound4:impact_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:sound4:pulse_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:sound4:first_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:sound4:impact_eco_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:sound4:pulse_eco_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:sound4:big_voice_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:big_voice:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:sound4:voice_ula2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula2:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:sound4:voice_ula4_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula4:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:sound4:voice_ula8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula8:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:sound4:ip_connect_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:ip_connect:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:sound4:wm2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:sound4:stream_x2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x2:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:sound4:stream_x4_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x4:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:sound4:stream_x8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x8:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:sound4:playout_ula8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:playout_ula8:-:*:*:*:*:*:*:*

History

29 Jan 2026, 16:11

Type Values Removed Values Added
References () https://web.archive.org/web/20221207074555/https://www.sound4.com/ - () https://web.archive.org/web/20221207074555/https://www.sound4.com/ - Product
References () https://www.exploit-db.com/exploits/51167 - () https://www.exploit-db.com/exploits/51167 - Exploit, Third Party Advisory
References () https://www.vulncheck.com/advisories/sound-server-service-local-privilege-escalation-via-unquoted-service-path - () https://www.vulncheck.com/advisories/sound-server-service-local-privilege-escalation-via-unquoted-service-path - Third Party Advisory
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5721.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5721.php - Third Party Advisory, Exploit
CPE cpe:2.3:h:sound4:impact:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x2:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:first_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:ip_connect:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:playout_ula8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:voice_ula4_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula4:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:voice_ula2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x8:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:pulse_eco_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:stream_x2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:ip_connect_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:voice_ula8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:pulse_eco:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:impact_eco_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:big_voice_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:first:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula2:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:big_voice:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:playout_ula8:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:stream_x8_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:stream_x4:-:*:*:*:*:*:*:*
cpe:2.3:o:sound4:stream_x4_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:o:sound4:wm2_firmware:4.1.102:*:*:*:*:*:*:*
cpe:2.3:h:sound4:wm2:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:voice_ula8:-:*:*:*:*:*:*:*
cpe:2.3:h:sound4:impact_eco:-:*:*:*:*:*:*:*
First Time Sound4 stream X2
Sound4
Sound4 impact Eco
Sound4 big Voice Firmware
Sound4 voice Ula8
Sound4 ip Connect Firmware
Sound4 voice Ula2
Sound4 first Firmware
Sound4 pulse Firmware
Sound4 wm2
Sound4 voice Ula8 Firmware
Sound4 stream X8
Sound4 voice Ula2 Firmware
Sound4 stream X8 Firmware
Sound4 impact
Sound4 stream X4 Firmware
Sound4 voice Ula4
Sound4 pulse
Sound4 playout Ula8 Firmware
Sound4 playout Ula8
Sound4 stream X4
Sound4 pulse Eco
Sound4 stream X2 Firmware
Sound4 ip Connect
Sound4 impact Eco Firmware
Sound4 impact Firmware
Sound4 big Voice
Sound4 wm2 Firmware
Sound4 pulse Eco Firmware
Sound4 voice Ula4 Firmware
Sound4 first

22 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-22 22:16

Updated : 2026-01-29 16:11


NVD link : CVE-2023-53965

Mitre link : CVE-2023-53965

CVE.ORG link : CVE-2023-53965


JSON object : View

Products Affected

sound4

  • ip_connect
  • stream_x4_firmware
  • stream_x2_firmware
  • impact_eco
  • voice_ula8
  • first_firmware
  • playout_ula8
  • stream_x8
  • impact_eco_firmware
  • stream_x8_firmware
  • stream_x2
  • wm2_firmware
  • ip_connect_firmware
  • big_voice_firmware
  • big_voice
  • playout_ula8_firmware
  • first
  • voice_ula4
  • voice_ula2
  • wm2
  • impact_firmware
  • stream_x4
  • pulse_eco_firmware
  • impact
  • voice_ula4_firmware
  • pulse
  • pulse_firmware
  • voice_ula2_firmware
  • pulse_eco
  • voice_ula8_firmware
CWE
CWE-428

Unquoted Search Path or Element