CVE-2026-23703

7.8 HIGH

📋 TL;DR

The installer for FinalCode Client by Digital Arts Inc. has incorrect default permissions that allow non-administrative users to execute arbitrary code with SYSTEM privileges. This affects all systems running vulnerable versions of FinalCode Client, enabling local privilege escalation.

💻 Affected Systems

Products:
  • FinalCode Client
Versions: Versions prior to 6.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the installer's default permission settings, making all standard installations vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access can gain full SYSTEM privileges, compromising the entire system, installing persistent malware, accessing all data, and potentially moving laterally across the network.

🟠

Likely Case

Malicious insider or compromised user account escalates privileges to SYSTEM to install keyloggers, steal credentials, or deploy ransomware on the local system.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system.
🏢 Internal Only: HIGH - Any compromised or malicious user account on affected systems can exploit this to gain complete control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is straightforward once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.0.0 and later

Vendor Advisory: https://www.daj.jp/shared/php/downloadset/c/parts.php?page=dl&filename=information_20260226_01.pdf

Restart Required: Yes

Instructions:

1. Download FinalCode Client version 6.0.0 or later from Digital Arts Inc. 2. Uninstall previous versions. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict installer directory permissions

windows

Manually adjust permissions on the FinalCode Client installation directory to prevent non-admin users from modifying files.

icacls "C:\Program Files\FinalCode Client" /inheritance:r /grant:r "SYSTEM:(OI)(CI)F" "Administrators:(OI)(CI)F" /deny "Users:(OI)(CI)(WD,AD)"

🧯 If You Can't Patch

  • Remove non-administrative users from affected systems or restrict their access
  • Implement application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check FinalCode Client version in Control Panel > Programs and Features. Versions below 6.0.0 are vulnerable.

Check Version:

wmic product where name="FinalCode Client" get version

Verify Fix Applied:

Verify installed version is 6.0.0 or higher and check installer directory permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected SYSTEM privilege processes spawned from user accounts
  • Modifications to FinalCode Client installation directory by non-admin users

Network Indicators:

  • Unusual outbound connections from systems running FinalCode Client

SIEM Query:

EventID=4688 AND NewProcessName="*FinalCode*" AND SubjectUserName!="SYSTEM" AND TokenElevationType="%%1938"

🔗 References

📤 Share & Export