CVE-2026-23703
📋 TL;DR
The installer for FinalCode Client by Digital Arts Inc. has incorrect default permissions that allow non-administrative users to execute arbitrary code with SYSTEM privileges. This affects all systems running vulnerable versions of FinalCode Client, enabling local privilege escalation.
💻 Affected Systems
- FinalCode Client
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
An attacker with local access can gain full SYSTEM privileges, compromising the entire system, installing persistent malware, accessing all data, and potentially moving laterally across the network.
Likely Case
Malicious insider or compromised user account escalates privileges to SYSTEM to install keyloggers, steal credentials, or deploy ransomware on the local system.
If Mitigated
With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.
🎯 Exploit Status
Exploitation requires local access but is straightforward once the vulnerability is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.0.0 and later
Vendor Advisory: https://www.daj.jp/shared/php/downloadset/c/parts.php?page=dl&filename=information_20260226_01.pdf
Restart Required: Yes
Instructions:
1. Download FinalCode Client version 6.0.0 or later from Digital Arts Inc. 2. Uninstall previous versions. 3. Install the updated version. 4. Restart the system.
🔧 Temporary Workarounds
Restrict installer directory permissions
windowsManually adjust permissions on the FinalCode Client installation directory to prevent non-admin users from modifying files.
icacls "C:\Program Files\FinalCode Client" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(WD,AD)"
🧯 If You Can't Patch
- Remove non-administrative users from affected systems or restrict their access
- Implement application whitelisting to prevent execution of unauthorized code
🔍 How to Verify
Check if Vulnerable:
Check FinalCode Client version in Control Panel > Programs and Features. Versions below 6.0.0 are vulnerable.
Check Version:
wmic product where name="FinalCode Client" get version
Verify Fix Applied:
Verify installed version is 6.0.0 or higher and check installer directory permissions are properly restricted.
📡 Detection & Monitoring
Log Indicators:
- Unexpected SYSTEM privilege processes spawned from user accounts
- Modifications to FinalCode Client installation directory by non-admin users
Network Indicators:
- Unusual outbound connections from systems running FinalCode Client
SIEM Query:
EventID=4688 AND NewProcessName="*FinalCode*" AND SubjectUserName!="SYSTEM" AND TokenElevationType="%%1938"