GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system. 

During installation, ERM creates a Windows service that runs under the LocalSystem account. 

When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context of the logged-in user. 

Functions such as 'Import Data' open a Windows file dialog operating with SYSTEM permissions, enabling modification or deletion of protected system files and directories. 

Any ERM function invoking Windows file open/save dialogs exposes the same risk. 

This vulnerability allows local privilege escalation and may result in full system compromise.

Subscriptions

No data.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 23 Mar 2026 01:45:00 +0000

Type Values Removed Values Added
Description GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system.  During installation, ERM creates a Windows service that runs under the LocalSystem account.  When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context of the logged-in user.  Functions such as 'Import Data' open a Windows file dialog operating with SYSTEM permissions, enabling modification or deletion of protected system files and directories.  Any ERM function invoking Windows file open/save dialogs exposes the same risk.  This vulnerability allows local privilege escalation and may result in full system compromise.
Title GeoVision ERM Improper Privilege Assignment Leads to SYSTEM-Level Privilege
Weaknesses CWE-250
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:N/R:I/V:C/RE:M/U:Green'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GV

Published:

Updated: 2026-03-23T01:15:18.367Z

Reserved: 2026-03-23T00:46:43.918Z

Link: CVE-2026-4606

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-23T02:16:05.213

Modified: 2026-03-23T02:16:05.213

Link: CVE-2026-4606

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses