CVE-2022-50931
Unknown Unknown - Not Provided
Insecure File Permissions in TeamSpeak 3.5.6 Enables Privilege Escalation

Publication date: 2026-01-13

Last updated on: 2026-02-02

Assigner: VulnCheck

Description
TeamSpeak 3.5.6 contains an insecure file permissions vulnerability that allows local attackers to replace executable files with malicious binaries. Attackers can replace system executables like ts3client_win32.exe with custom files to potentially gain SYSTEM or Administrator-level access.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-13
Last Modified
2026-02-02
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
teamspeak teamspeak 3.5.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2022-50931 is a vulnerability in TeamSpeak version 3.5.6 caused by insecure file permissions. It allows local attackers to replace critical executable files, such as ts3client_win32.exe, with malicious binaries. Because these executables have overly permissive access rights, an attacker with local access can substitute them, potentially leading to privilege escalation to SYSTEM or Administrator-level access. [2, 4]


How can this vulnerability impact me? :

This vulnerability can have a severe impact by allowing a local attacker to escalate their privileges to SYSTEM or Administrator level on the affected machine. By replacing legitimate TeamSpeak executables with malicious ones, the attacker can gain full control over the system, compromising confidentiality, integrity, and availability of the system and data. [2, 4]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the file permissions of critical TeamSpeak executable files such as ts3client_win32.exe, update.exe, package_inst.exe, QtWebEngineProcess.exe, and createfileassoc.exe. On Windows systems, you can use the icacls command to inspect the permissions of these files. For example, running `icacls ts3client_win32.exe` will show if the file has overly permissive access rights that allow modification by unauthorized users, indicating the presence of the vulnerability. [4]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting the file permissions of the affected TeamSpeak executables to prevent unauthorized modification. This involves removing overly permissive access rights and ensuring that only SYSTEM and trusted administrator accounts have write permissions. Additionally, updating to a patched version of TeamSpeak, if available, or applying vendor-recommended fixes is advised to fully resolve the issue. [4, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart