📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Information Technology CRITICAL 57m Global vulnerability Technology and Software Development HIGH 1h Global general Cybersecurity MEDIUM 1h Global vulnerability Information Technology HIGH 1h Global vulnerability Cybersecurity / Enterprise Security HIGH 2h Global vulnerability Information Technology HIGH 2h Global vulnerability Technology/Software HIGH 3h Global data_breach Media and Entertainment HIGH 4h Global general Critical Infrastructure / Operational Technology LOW 4h Global apt Energy/Oil and Gas CRITICAL 4h Global vulnerability Information Technology CRITICAL 57m Global vulnerability Technology and Software Development HIGH 1h Global general Cybersecurity MEDIUM 1h Global vulnerability Information Technology HIGH 1h Global vulnerability Cybersecurity / Enterprise Security HIGH 2h Global vulnerability Information Technology HIGH 2h Global vulnerability Technology/Software HIGH 3h Global data_breach Media and Entertainment HIGH 4h Global general Critical Infrastructure / Operational Technology LOW 4h Global apt Energy/Oil and Gas CRITICAL 4h Global vulnerability Information Technology CRITICAL 57m Global vulnerability Technology and Software Development HIGH 1h Global general Cybersecurity MEDIUM 1h Global vulnerability Information Technology HIGH 1h Global vulnerability Cybersecurity / Enterprise Security HIGH 2h Global vulnerability Information Technology HIGH 2h Global vulnerability Technology/Software HIGH 3h Global data_breach Media and Entertainment HIGH 4h Global general Critical Infrastructure / Operational Technology LOW 4h Global apt Energy/Oil and Gas CRITICAL 4h
Vulnerabilities

CVE-2026-23703

High
The installer of FinalCode Client provided by Digital Arts Inc. contains an incorrect default permissions vulnerability. A non-administrative user may execute arbitrary code with SYSTEM privilege.
CWE-276 — Weakness Type
Published: Feb 26, 2026  ·  Modified: Mar 5, 2026  ·  Source: NVD
CVSS v3
7.8
🔗 NVD Official
📄 Description (English)

The installer of FinalCode Client provided by Digital Arts Inc. contains an incorrect default permissions vulnerability. A non-administrative user may execute arbitrary code with SYSTEM privilege.

🤖 AI Executive Summary

CVE-2026-23703 is a privilege escalation vulnerability in FinalCode Client installer that allows non-administrative users to execute arbitrary code with SYSTEM privileges through incorrect default file permissions. With a CVSS score of 7.8 and no public exploit currently available, this poses a significant risk to organizations using FinalCode for data loss prevention. Immediate patching is recommended as the vulnerability can be exploited locally to gain complete system control.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 29, 2026 00:26
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability primarily impacts Saudi organizations in Banking (SAMA-regulated institutions), Government agencies (NCA oversight), Healthcare facilities, and Energy sector (ARAMCO and subsidiaries) that deploy FinalCode Client for data loss prevention and endpoint security. The privilege escalation capability poses critical risk to confidentiality, integrity, and availability of sensitive data. Government entities and financial institutions are particularly vulnerable as they handle classified and regulated information. Telecom operators (STC, Mobily) using FinalCode for DLP may also be affected.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare and Medical Facilities Energy and Utilities Telecommunications Defense and Security Critical Infrastructure
⚖️ Saudi Risk Score (AI)
8.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all systems running FinalCode Client using asset inventory and endpoint management tools
2. Prioritize patching for systems in banking, government, healthcare, and energy sectors
3. Restrict local access to FinalCode installation directories pending patch deployment

PATCHING GUIDANCE:
1. Download the latest FinalCode Client patch from Digital Arts Inc. official portal
2. Deploy patches through centralized patch management systems (SCCM, Intune, etc.)
3. Test patches in non-production environments first
4. Schedule maintenance windows for production deployment
5. Verify patch installation and file permissions post-deployment

COMPENSATING CONTROLS (if immediate patching not possible):
1. Implement file permission auditing on FinalCode installation directories
2. Deploy application whitelisting to prevent unauthorized code execution
3. Monitor for suspicious SYSTEM-level process creation from non-admin users
4. Restrict local administrative access and enforce principle of least privilege
5. Enable Windows Event Log monitoring for privilege escalation attempts

DETECTION RULES:
1. Monitor for file permission modifications in FinalCode installation paths (typically C:\Program Files\FinalCode)
2. Alert on SYSTEM privilege process creation initiated by non-administrative user accounts
3. Track suspicious DLL injection or code execution from FinalCode directories
4. Monitor Windows Security Event ID 4688 for privilege escalation patterns
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع الأنظمة التي تقوم بتشغيل عميل FinalCode باستخدام أدوات جرد الأصول وإدارة نقاط النهاية
2. إعطاء الأولوية لتصحيح الأنظمة في قطاعات البنوك والحكومة والرعاية الصحية والطاقة
3. تقييد الوصول المحلي إلى دلائل تثبيت FinalCode في انتظار نشر التصحيح

إرشادات التصحيح:
1. تحميل أحدث تصحيح عميل FinalCode من بوابة Digital Arts Inc. الرسمية
2. نشر التصحيحات من خلال أنظمة إدارة التصحيحات المركزية (SCCM, Intune, إلخ)
3. اختبار التصحيحات في بيئات غير الإنتاج أولاً
4. جدولة نوافذ الصيانة لنشر الإنتاج
5. التحقق من تثبيت التصحيح وأذونات الملفات بعد النشر

الضوابط البديلة (إذا لم يكن التصحيح الفوري ممكناً):
1. تنفيذ تدقيق أذونات الملفات على دلائل تثبيت FinalCode
2. نشر قائمة بيضاء للتطبيقات لمنع تنفيذ الأكواد غير المصرح بها
3. مراقبة محاولات إنشاء عمليات على مستوى SYSTEM من قبل مستخدمين غير إداريين
4. تقييد الوصول الإداري المحلي وفرض مبدأ أقل امتياز
5. تفعيل مراقبة سجل أحداث Windows لمحاولات تصعيد الامتيازات

قواعد الكشف:
1. مراقبة تعديلات أذونات الملفات في مسارات تثبيت FinalCode
2. تنبيهات إنشاء عمليات امتياز SYSTEM التي يبدأها حسابات مستخدم غير إدارية
3. تتبع حقن DLL المريب أو تنفيذ الأكواد من دلائل FinalCode
4. مراقبة معرف حدث أمان Windows 4688 لأنماط تصعيد الامتيازات
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Access Control Policies ECC 2024 A.5.2.1 - User Registration and De-registration ECC 2024 A.5.3.1 - Access Rights Review ECC 2024 A.6.1.2 - Segregation of Duties ECC 2024 A.12.2.1 - Change Management
🔵 SAMA CSF
SAMA CSF ID.AM-2 - Software Inventory SAMA CSF PR.AC-1 - Access Control Policy SAMA CSF PR.AC-4 - Access Rights Management SAMA CSF DE.CM-3 - Monitoring for Unauthorized Access SAMA CSF RS.MI-2 - Incident Response and Management
🟡 ISO 27001:2022
ISO 27001:2022 A.5.3 - Segregation of Duties ISO 27001:2022 A.6.2 - User Access Management ISO 27001:2022 A.8.1 - User Endpoint Devices ISO 27001:2022 A.12.6.1 - Management of Technical Vulnerabilities ISO 27001:2022 A.14.2.1 - Secure Development Policy
🟣 PCI DSS v4.0
PCI DSS 2.2.4 - Configure System Security Parameters PCI DSS 6.2 - Ensure Security Patches Installed PCI DSS 7.1 - Limit Access to System Components PCI DSS 10.2 - Implement Automated Audit Trails
📊 CVSS Score
7.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorL — Low / Local
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score7.8
CWECWE-276
Exploit No
Patch ✓ Yes
Published 2026-02-26
Source Feed nvd
Views 3
🇸🇦 Saudi Risk Score
8.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-276
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.