Description
GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system. 

During installation, ERM creates a Windows service that runs under the LocalSystem account. 

When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context of the logged-in user. 

Functions such as 'Import Data' open a Windows file dialog operating with SYSTEM permissions, enabling modification or deletion of protected system files and directories. 

Any ERM function invoking Windows file open/save dialogs exposes the same risk. 

This vulnerability allows local privilege escalation and may result in full system compromise.
Published: 2026-03-23
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Local Privilege Escalation to SYSTEM
Action: Immediate Patch
AI Analysis

Impact

GV Edge Recording Manager v2.3.1 contains an improper privilege assignment flaw that causes the application to run components with SYSTEM-level privileges. During installation the software creates a Windows service that operates under the LocalSystem account, and subsequent ERM processes inherit this high privilege context. Because functions such as 'Import Data' use Windows file dialogs that also run under SYSTEM, any local user can manipulate protected system files, directories, or configurations. This flaw results in local privilege escalation, enabling an attacker to gain full control of the operating system.

Affected Systems

The vulnerability is specific to GeoVision's GV-Edge Recording Manager version 2.3.1. No other versions or GeoVision products are mentioned, and the CNA vendor list indicates only GV-Edge Recording Manager as affected. The risk applies to Windows environments where the ERM is installed and a local user has access to launch the application.

Risk and Exploitability

The CVSS score of 10.0 reflects a maximum severity and indicates that the vulnerability is exploitable in a local context with the attacker already having a user account. While EPSS data is not provided, the lack of a KEV listing does not diminish the need for timely remediation. An attacker can trigger the flaw by simply launching the ERM and selecting any function that opens a file dialog, thereby triggering SYSTEM‑level code execution. Once SYSTEM privileges are achieved, the attacker can compromise the entire host.

Generated by OpenCVE AI on March 23, 2026 at 03:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official GeoVision patch or upgrade to a later release that removes the SYSTEM‑level service.
  • If no patch is available, reconfigure or disable the GV‑Edge ERM Windows service and run the application under a standard user account.
  • Restrict local user permissions or isolate the ERM deployment from privileged accounts and monitor for unauthorized file changes.

Generated by OpenCVE AI on March 23, 2026 at 03:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Geovision
Geovision gv-edge Recording Manager
Vendors & Products Geovision
Geovision gv-edge Recording Manager

Mon, 23 Mar 2026 01:45:00 +0000

Type Values Removed Values Added
Description GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system.  During installation, ERM creates a Windows service that runs under the LocalSystem account.  When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context of the logged-in user.  Functions such as 'Import Data' open a Windows file dialog operating with SYSTEM permissions, enabling modification or deletion of protected system files and directories.  Any ERM function invoking Windows file open/save dialogs exposes the same risk.  This vulnerability allows local privilege escalation and may result in full system compromise.
Title GeoVision ERM Improper Privilege Assignment Leads to SYSTEM-Level Privilege
Weaknesses CWE-250
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:N/R:I/V:C/RE:M/U:Green'}


Subscriptions

Geovision Gv-edge Recording Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: GV

Published:

Updated: 2026-03-24T03:56:02.798Z

Reserved: 2026-03-23T00:46:43.918Z

Link: CVE-2026-4606

cve-icon Vulnrichment

Updated: 2026-03-23T13:35:10.273Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-23T02:16:05.213

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-4606

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:50:02Z

Weaknesses