CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
CVE-2026-25191 is a high-severity vulnerability in the installer of Digital Arts Inc. 's FinalCode Ver. 5 series prior to version 5. 43R01. The issue arises from an uncontrolled search path element for DLL loading during installation. If an attacker can place a malicious DLL in the same directory as the installer and convince a user to run the installer, arbitrary code execution can occur with the installer's privileges. Exploitation requires local access and user interaction but no prior authentication. The vulnerability impacts confidentiality, integrity, and availability due to potential full system compromise. No known exploits are currently reported in the wild. Organizations using affected versions should update promptly and implement strict directory and file integrity controls to mitigate risk.
AI Analysis
Technical Summary
CVE-2026-25191 is a vulnerability affecting the installer component of Digital Arts Inc.'s FinalCode Ver.5 series, specifically versions prior to 5.43R01. The root cause is an uncontrolled search path element for DLLs during the installation process. When the installer executes, it loads DLLs from its current directory without validating or restricting the search path, allowing an attacker with local access to place a malicious DLL alongside the installer executable. Upon execution, the installer loads the malicious DLL, resulting in arbitrary code execution with the installer's execution privileges. This vulnerability requires the attacker to have the ability to place files in the installer's directory and to persuade a user to run the installer, implying user interaction is necessary. The CVSS v3.0 base score is 7.8, reflecting high severity due to the potential for full system compromise (confidentiality, integrity, and availability impacts). The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is needed (UI:R). The scope remains unchanged (S:U). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to environments where FinalCode Ver.5 is deployed, especially if users have the ability to run installers from untrusted directories. The vulnerability highlights the importance of secure DLL loading practices and proper installer design to prevent DLL hijacking or search path manipulation attacks.
Potential Impact
The vulnerability allows an attacker with local access to execute arbitrary code with the privileges of the installer, which may be elevated depending on the environment. This can lead to full compromise of affected systems, including unauthorized access to sensitive data (confidentiality impact), modification or destruction of data (integrity impact), and disruption of services or system availability. Organizations using FinalCode Ver.5 prior to 5.43R01 are at risk, particularly if users can be tricked into running installers from directories where attackers can place malicious DLLs. The attack requires user interaction but no authentication, increasing the risk in environments with less controlled user privileges or where social engineering is feasible. The potential impact extends to any system where the vulnerable installer is used, including enterprise environments that rely on FinalCode for data protection and encryption. The absence of known exploits in the wild suggests the threat is not yet actively exploited, but the vulnerability's nature and severity warrant immediate attention to prevent future attacks.
Mitigation Recommendations
1. Upgrade to FinalCode Ver.5.43R01 or later, where the vulnerability is patched. 2. Restrict write permissions on directories where installers are stored or executed to prevent unauthorized placement of DLL files. 3. Educate users to avoid running installers from untrusted or unknown directories, especially those received via email or external media. 4. Implement application whitelisting to control which executables and DLLs can run on endpoints. 5. Use endpoint detection and response (EDR) tools to monitor for suspicious DLL loading or installer execution behaviors. 6. Employ integrity verification mechanisms on installer files and associated DLLs to detect tampering. 7. Consider running installers with the least privilege necessary to limit the impact of potential code execution. 8. Regularly audit and monitor file system permissions and user activities related to software installation processes. These steps collectively reduce the risk of exploitation by limiting the attack surface and improving detection capabilities.
Affected Countries
Japan, United States, South Korea, Germany, United Kingdom, France, Australia, Canada, Singapore
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
Description
CVE-2026-25191 is a high-severity vulnerability in the installer of Digital Arts Inc. 's FinalCode Ver. 5 series prior to version 5. 43R01. The issue arises from an uncontrolled search path element for DLL loading during installation. If an attacker can place a malicious DLL in the same directory as the installer and convince a user to run the installer, arbitrary code execution can occur with the installer's privileges. Exploitation requires local access and user interaction but no prior authentication. The vulnerability impacts confidentiality, integrity, and availability due to potential full system compromise. No known exploits are currently reported in the wild. Organizations using affected versions should update promptly and implement strict directory and file integrity controls to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2026-25191 is a vulnerability affecting the installer component of Digital Arts Inc.'s FinalCode Ver.5 series, specifically versions prior to 5.43R01. The root cause is an uncontrolled search path element for DLLs during the installation process. When the installer executes, it loads DLLs from its current directory without validating or restricting the search path, allowing an attacker with local access to place a malicious DLL alongside the installer executable. Upon execution, the installer loads the malicious DLL, resulting in arbitrary code execution with the installer's execution privileges. This vulnerability requires the attacker to have the ability to place files in the installer's directory and to persuade a user to run the installer, implying user interaction is necessary. The CVSS v3.0 base score is 7.8, reflecting high severity due to the potential for full system compromise (confidentiality, integrity, and availability impacts). The attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is needed (UI:R). The scope remains unchanged (S:U). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to environments where FinalCode Ver.5 is deployed, especially if users have the ability to run installers from untrusted directories. The vulnerability highlights the importance of secure DLL loading practices and proper installer design to prevent DLL hijacking or search path manipulation attacks.
Potential Impact
The vulnerability allows an attacker with local access to execute arbitrary code with the privileges of the installer, which may be elevated depending on the environment. This can lead to full compromise of affected systems, including unauthorized access to sensitive data (confidentiality impact), modification or destruction of data (integrity impact), and disruption of services or system availability. Organizations using FinalCode Ver.5 prior to 5.43R01 are at risk, particularly if users can be tricked into running installers from directories where attackers can place malicious DLLs. The attack requires user interaction but no authentication, increasing the risk in environments with less controlled user privileges or where social engineering is feasible. The potential impact extends to any system where the vulnerable installer is used, including enterprise environments that rely on FinalCode for data protection and encryption. The absence of known exploits in the wild suggests the threat is not yet actively exploited, but the vulnerability's nature and severity warrant immediate attention to prevent future attacks.
Mitigation Recommendations
1. Upgrade to FinalCode Ver.5.43R01 or later, where the vulnerability is patched. 2. Restrict write permissions on directories where installers are stored or executed to prevent unauthorized placement of DLL files. 3. Educate users to avoid running installers from untrusted or unknown directories, especially those received via email or external media. 4. Implement application whitelisting to control which executables and DLLs can run on endpoints. 5. Use endpoint detection and response (EDR) tools to monitor for suspicious DLL loading or installer execution behaviors. 6. Employ integrity verification mechanisms on installer files and associated DLLs to detect tampering. 7. Consider running installers with the least privilege necessary to limit the impact of potential code execution. 8. Regularly audit and monitor file system permissions and user activities related to software installation processes. These steps collectively reduce the risk of exploitation by limiting the attack surface and improving detection capabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- jpcert
- Date Reserved
- 2026-02-12T07:13:34.985Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699fe090b7ef31ef0bbb51b8
Added to database: 2/26/2026, 5:56:32 AM
Last enriched: 2/26/2026, 6:10:49 AM
Last updated: 2/26/2026, 7:04:21 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumCVE-2026-2498: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in bulktheme WP Social Meta
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.