CVE-2022-50693
Published: 13 January 2026
Summary
CVE-2022-50693 is a high-severity Unquoted Search Path or Element (CWE-428) vulnerability in Splashtop Software Updater (inferred from references). Its CVSS base score is 8.4 (High).
Operationally, ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and CM-7 (Least Functionality).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces secure configuration settings for services, including quoted executable paths, directly preventing exploitation of unquoted service path vulnerabilities like CVE-2022-50693.
Requires timely identification, reporting, and remediation of flaws such as the unquoted service path in Splashtop Software Updater Service to eliminate the vulnerability.
Restricts system functionality to essential authorized software only, blocking execution of malicious executables injected via the unquoted service path.
NVD Description
Splashtop 8.71.12001.0 contains an unquoted service path vulnerability in the Splashtop Software Updater Service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in C:\Program Files (x86)\Splashtop\Splashtop Software Updater\ to inject malicious executables and…
more
escalate privileges.
Deeper analysisAI
CVE-2022-50693 is an unquoted service path vulnerability in Splashtop version 8.71.12001.0, specifically affecting the Splashtop Software Updater Service. The issue arises from an unquoted path at C:\Program Files (x86)\Splashtop\Splashtop Software Updater\, enabling local attackers to potentially execute arbitrary code by injecting malicious executables into accessible directories along the search path. This flaw is classified under CWE-428 and carries a CVSS 3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its high severity due to low complexity and no prerequisite privileges.
Local attackers can exploit this vulnerability with minimal requirements, as it demands only local access and no user interaction or elevated privileges. Successful exploitation allows attackers to execute arbitrary code, leading to privilege escalation and high-impact compromises of confidentiality, integrity, and availability on the affected system.
Advisories and additional details on mitigation are documented in references such as Exploit-DB (https://www.exploit-db.com/exploits/51182), Splashtop's official site (https://www.splashtop.com), and VulnCheck (https://www.vulncheck.com/advisories/splashtop-unquoted-service-path). Security practitioners should review these for vendor-recommended patches or workarounds.
A public exploit is available on Exploit-DB, indicating active proof-of-concept development as of the CVE's publication on 2026-01-13.
Details
- CWE(s)