CVE-2022-50693
Unquoted Service Path in Splashtop Updater Enables Code Execution
Publication date: 2026-01-13
Last updated on: 2026-01-13
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| splashtop | splashtop | to 8.71.12001.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-428 | The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2022-50693 is an unquoted service path vulnerability in the Splashtop Software Updater Service (version 8.71.12001.0 and earlier). The service executable path is not enclosed in quotes, which allows local attackers to place malicious executables in the path. When the service runs, it may execute these malicious files, enabling the attacker to run arbitrary code and escalate privileges on the affected system. [1, 3]
How can this vulnerability impact me? :
This vulnerability can allow a local attacker with limited privileges to execute arbitrary code with elevated privileges by exploiting the unquoted service path. Because the service runs with auto-start enabled under the LocalSystem account, successful exploitation can lead to full system compromise, including unauthorized access, data modification, and disruption of system availability. [1, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by checking the service configuration for the Splashtop Software Updater Service (SSUService) to see if the executable path is unquoted. Use the command 'sc qc SSUService' to query the service configuration and confirm the unquoted binary path. Additionally, you can use Windows Management Instrumentation Command-line (WMIC) to list services with auto-start enabled and filter out system paths to identify potentially vulnerable services. [3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include correcting the unquoted service path by enclosing the executable path in quotes to prevent execution of malicious executables. Ensure that the Splashtop Software Updater Service path is properly quoted in the service configuration. Additionally, restrict local user permissions to prevent unauthorized users from placing executables in the vulnerable path. Applying the latest patches or updates from Splashtop, if available, is also recommended. [1, 3]