CVE-2022-50931
Published: 13 January 2026
Summary
CVE-2022-50931 is a high-severity Incorrect Permission Assignment for Critical Resource (CWE-732) vulnerability in Teamspeak Teamspeak. Its CVSS base score is 7.8 (High).
Operationally, ranked at the 4.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-5 (Access Restrictions for Change).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly protects the integrity of executable programs like ts3client_win32.exe from unauthorized modification by local attackers exploiting insecure file permissions.
Enforces approved access control policies on system resources, including restrictive file permissions that prevent low-privilege local users from overwriting critical executables.
Restricts and authorizes physical and logical access associated with changes to system components, mitigating the ability of local attackers to replace executables due to permissive permissions.
NVD Description
TeamSpeak 3.5.6 contains an insecure file permissions vulnerability that allows local attackers to replace executable files with malicious binaries. Attackers can replace system executables like ts3client_win32.exe with custom files to potentially gain SYSTEM or Administrator-level access.
Deeper analysisAI
CVE-2022-50931 is an insecure file permissions vulnerability (CWE-732) in TeamSpeak 3.5.6 that enables local attackers to replace executable files with malicious binaries. The issue affects critical system executables, such as ts3client_win32.exe, due to overly permissive access controls. It carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high impact with low attack complexity and privileges required.
Local attackers with low-level privileges on the system can exploit this vulnerability by overwriting protected executables with custom malicious files. Successful exploitation allows elevation to SYSTEM or Administrator-level access, enabling full control over the compromised host through arbitrary code execution.
Advisories and potential patches are detailed in resources including the VulnCheck advisory at https://www.vulncheck.com/advisories/teamspeak-insecure-file-permissions, TeamSpeak's official site at https://www.teamspeak.com, and downloads page at https://www.teamspeak.com/en/downloads. A proof-of-concept exploit is available at https://www.exploit-db.com/exploits/50743.
Details
- CWE(s)