CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
The installer of FinalCode Client provided by Digital Arts Inc. contains an issue with the DLL search path. If a user is directed to place a malicious DLL file and the installer to the same directory and execute the installer, arbitrary code may be executed with the installer's execution privilege.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-25191 affects the installer component of Digital Arts Inc.'s FinalCode Ver.5 series, specifically versions prior to 5.43R01. The root cause is an uncontrolled search path element vulnerability related to DLL loading during the installation process. When the installer executes, it searches for required DLLs in its current directory without sufficient validation or path restrictions. An attacker with local access can place a malicious DLL file in the same directory as the installer executable. If a user then runs the installer from that directory, the malicious DLL is loaded instead of the legitimate one, resulting in arbitrary code execution with the installer's execution privileges. This can lead to full compromise of the affected system, including unauthorized data access, modification, or disruption of services. The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with attack vector local, low attack complexity, no privileges required, but user interaction necessary. Although no exploits are currently known in the wild, the vulnerability poses a significant risk, especially in environments where users may run installers from untrusted or shared directories. The vulnerability highlights the importance of secure DLL search path handling and the risks of executing installers from directories writable by untrusted users.
Potential Impact
The potential impact of CVE-2026-25191 is substantial for organizations using affected versions of FinalCode Ver.5. Successful exploitation allows arbitrary code execution with the installer's privileges, which could be elevated depending on the context. This can lead to unauthorized disclosure of sensitive data, modification or deletion of critical files, installation of persistent malware, or disruption of business operations. Since the vulnerability requires local access and user interaction, the threat is particularly relevant in environments where users may download installers to shared or user-writable directories, such as corporate endpoints, development environments, or remote workstations. Attackers could leverage social engineering to trick users into executing the compromised installer. The compromise of systems running FinalCode could undermine data protection and encryption workflows, impacting organizations relying on this software for secure file handling. Overall, the vulnerability could facilitate lateral movement, privilege escalation, and data breaches if exploited.
Mitigation Recommendations
To mitigate CVE-2026-25191, organizations should immediately upgrade FinalCode Ver.5 to version 5.43R01 or later, where the vulnerability is addressed. Until patching is possible, enforce strict controls on the directories from which installers are executed, ensuring they are not writable by untrusted users to prevent placement of malicious DLLs. Educate users to avoid running installers from untrusted or shared directories and to verify the integrity and source of installation files. Implement application whitelisting and endpoint protection solutions that can detect or block unauthorized DLL loading or suspicious installer behavior. Use least privilege principles to limit the installer's execution context where feasible. Additionally, monitor systems for unusual activity following installation attempts and maintain robust incident response plans to quickly address potential compromises. Vendors and administrators should also review and harden DLL search path handling in software deployment processes to prevent similar vulnerabilities.
Affected Countries
Japan, United States, South Korea, Germany, United Kingdom, France, Australia, Canada, Singapore, India
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
Description
The installer of FinalCode Client provided by Digital Arts Inc. contains an issue with the DLL search path. If a user is directed to place a malicious DLL file and the installer to the same directory and execute the installer, arbitrary code may be executed with the installer's execution privilege.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-25191 affects the installer component of Digital Arts Inc.'s FinalCode Ver.5 series, specifically versions prior to 5.43R01. The root cause is an uncontrolled search path element vulnerability related to DLL loading during the installation process. When the installer executes, it searches for required DLLs in its current directory without sufficient validation or path restrictions. An attacker with local access can place a malicious DLL file in the same directory as the installer executable. If a user then runs the installer from that directory, the malicious DLL is loaded instead of the legitimate one, resulting in arbitrary code execution with the installer's execution privileges. This can lead to full compromise of the affected system, including unauthorized data access, modification, or disruption of services. The CVSS v3.0 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with attack vector local, low attack complexity, no privileges required, but user interaction necessary. Although no exploits are currently known in the wild, the vulnerability poses a significant risk, especially in environments where users may run installers from untrusted or shared directories. The vulnerability highlights the importance of secure DLL search path handling and the risks of executing installers from directories writable by untrusted users.
Potential Impact
The potential impact of CVE-2026-25191 is substantial for organizations using affected versions of FinalCode Ver.5. Successful exploitation allows arbitrary code execution with the installer's privileges, which could be elevated depending on the context. This can lead to unauthorized disclosure of sensitive data, modification or deletion of critical files, installation of persistent malware, or disruption of business operations. Since the vulnerability requires local access and user interaction, the threat is particularly relevant in environments where users may download installers to shared or user-writable directories, such as corporate endpoints, development environments, or remote workstations. Attackers could leverage social engineering to trick users into executing the compromised installer. The compromise of systems running FinalCode could undermine data protection and encryption workflows, impacting organizations relying on this software for secure file handling. Overall, the vulnerability could facilitate lateral movement, privilege escalation, and data breaches if exploited.
Mitigation Recommendations
To mitigate CVE-2026-25191, organizations should immediately upgrade FinalCode Ver.5 to version 5.43R01 or later, where the vulnerability is addressed. Until patching is possible, enforce strict controls on the directories from which installers are executed, ensuring they are not writable by untrusted users to prevent placement of malicious DLLs. Educate users to avoid running installers from untrusted or shared directories and to verify the integrity and source of installation files. Implement application whitelisting and endpoint protection solutions that can detect or block unauthorized DLL loading or suspicious installer behavior. Use least privilege principles to limit the installer's execution context where feasible. Additionally, monitor systems for unusual activity following installation attempts and maintain robust incident response plans to quickly address potential compromises. Vendors and administrators should also review and harden DLL search path handling in software deployment processes to prevent similar vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2026-02-12T07:13:34.985Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699fe090b7ef31ef0bbb51b8
Added to database: 2/26/2026, 5:56:32 AM
Last enriched: 3/5/2026, 11:39:35 AM
Last updated: 4/12/2026, 3:44:21 PM
Views: 91
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.