Cyber Posture

CVE-2022-50693

HighPublic PoC

Published: 13 January 2026

Published
13 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0002 4.7th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2022-50693 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Splashtop Software Updater (inferred from references). Its CVSS base score is 8.4 (High).

Operationally, ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and CM-7 (Least Functionality).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces secure configuration settings for services, including quoted executable paths, directly preventing exploitation of unquoted service path vulnerabilities like CVE-2022-50693.

prevent

Requires timely identification, reporting, and remediation of flaws such as the unquoted service path in Splashtop Software Updater Service to eliminate the vulnerability.

prevent

Restricts system functionality to essential authorized software only, blocking execution of malicious executables injected via the unquoted service path.

NVD Description

Splashtop 8.71.12001.0 contains an unquoted service path vulnerability in the Splashtop Software Updater Service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:\Program Files (x86)\Splashtop\Splashtop Software Updater\ to inject malicious executables and…

more

escalate privileges.

Deeper analysisAI

CVE-2022-50693 is an unquoted service path vulnerability in Splashtop version 8.71.12001.0, specifically affecting the Splashtop Software Updater Service. The issue arises from an unquoted path at C:\Program Files (x86)\Splashtop\Splashtop Software Updater\, enabling local attackers to potentially execute arbitrary code by injecting malicious executables into accessible directories along the search path. This flaw is classified under CWE-428 and carries a CVSS 3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its high severity due to low complexity and no prerequisite privileges.

Local attackers can exploit this vulnerability with minimal requirements, as it demands only local access and no user interaction or elevated privileges. Successful exploitation allows attackers to execute arbitrary code, leading to privilege escalation and high-impact compromises of confidentiality, integrity, and availability on the affected system.

Advisories and additional details on mitigation are documented in references such as Exploit-DB (https://www.exploit-db.com/exploits/51182), Splashtop's official site (https://www.splashtop.com), and VulnCheck (https://www.vulncheck.com/advisories/splashtop-unquoted-service-path). Security practitioners should review these for vendor-recommended patches or workarounds.

A public exploit is available on Exploit-DB, indicating active proof-of-concept development as of the CVE's publication on 2026-01-13.

Details

CWE(s)

Affected Products

Splashtop
Software Updater
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2019-25276Shared CWE-428
CVE-2020-37098Shared CWE-428
CVE-2021-47809Shared CWE-428
CVE-2024-57276Shared CWE-428
CVE-2020-37100Shared CWE-428
CVE-2021-47790Shared CWE-428
CVE-2020-36976Shared CWE-428
CVE-2021-47787Shared CWE-428
CVE-2021-47833Shared CWE-428
CVE-2021-47861Shared CWE-428

References