Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4606: CWE-250 Execution with unnecessary privileges in GeoVision GV-Edge Recording Manager

0
Critical
VulnerabilityCVE-2026-4606cvecve-2026-4606cwe-250
Published: Mon Mar 23 2026 (03/23/2026, 01:05:31 UTC)
Source: CVE Database V5
Vendor/Project: GeoVision
Product: GV-Edge Recording Manager

Description

CVE-2026-4606 is a critical local privilege escalation vulnerability in GeoVision GV-Edge Recording Manager (ERM) version 2. 3. 1. The application improperly runs components with SYSTEM-level privileges by creating a Windows service under the LocalSystem account and spawning processes with SYSTEM permissions rather than the logged-in user's context. This design flaw allows any local user to execute functions such as 'Import Data' that open Windows file dialogs with SYSTEM privileges, enabling modification or deletion of protected system files. Exploitation requires local access but no authentication or user interaction, potentially leading to full system compromise. No known exploits are currently reported in the wild. Organizations using GV-Edge Recording Manager 2. 3. 1 should urgently apply patches or implement mitigations to prevent unauthorized privilege escalation and maintain system integrity.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 01:45:55 UTC

Technical Analysis

The vulnerability CVE-2026-4606 affects GeoVision's GV-Edge Recording Manager (ERM) version 2.3.1, where the application improperly executes components with excessive privileges. During installation, ERM creates a Windows service running under the LocalSystem account, which inherently has the highest privileges on Windows systems. When the ERM application is launched, it spawns related processes under SYSTEM privileges instead of the security context of the logged-in user. This architectural flaw means that any ERM function invoking Windows file open/save dialogs, such as the 'Import Data' feature, operates with SYSTEM-level permissions. Consequently, local users can leverage these dialogs to modify or delete protected system files and directories, effectively escalating their privileges from a standard user to full system control. This vulnerability is classified under CWE-250 (Execution with Unnecessary Privileges), highlighting improper privilege management. The CVSS 4.0 base score is 10.0 (critical), reflecting the vulnerability's ease of exploitation (no authentication or user interaction required), the high impact on confidentiality, integrity, and availability, and the broad scope affecting all systems running the vulnerable ERM version. Although no exploits have been reported in the wild yet, the vulnerability poses a severe risk to any organization using this software, especially those with multiple local users or shared systems.

Potential Impact

The impact of CVE-2026-4606 is severe for organizations worldwide using GV-Edge Recording Manager 2.3.1. Local users, including potentially low-privileged or guest accounts, can escalate their privileges to SYSTEM level, gaining full control over the affected Windows system. This can lead to unauthorized modification or deletion of critical system files, installation of persistent malware, disabling of security controls, and complete system compromise. For organizations relying on GV-Edge Recording Manager for video surveillance or recording management, this vulnerability could allow attackers to tamper with security footage, disrupt monitoring operations, or use compromised systems as footholds for lateral movement within networks. The vulnerability's exploitation does not require network access or user interaction, increasing the risk in environments where multiple users have local access. The potential for full system compromise threatens confidentiality, integrity, and availability of critical systems, making this a high-priority security concern.

Mitigation Recommendations

To mitigate CVE-2026-4606, organizations should immediately upgrade GV-Edge Recording Manager to a patched version once available from GeoVision. In the absence of an official patch, consider the following specific mitigations: 1) Restrict local user access to systems running ERM to trusted administrators only, minimizing the risk of unprivileged users exploiting the vulnerability. 2) Use Windows Group Policy to limit which users can log on locally or interact with the ERM service. 3) Employ application whitelisting and endpoint protection solutions to monitor and block unauthorized attempts to launch or manipulate ERM processes. 4) Audit and monitor file system changes, especially in protected system directories, to detect suspicious activity related to ERM file dialogs. 5) Consider running ERM in a hardened environment or sandbox with reduced privileges if possible, or isolate it on dedicated machines with strict access controls. 6) Regularly review and tighten permissions on the ERM installation directory and related files to prevent unauthorized modifications. 7) Educate system administrators and users about the risks of local privilege escalation vulnerabilities and the importance of least privilege principles.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GV
Date Reserved
2026-03-23T00:46:43.918Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c097cbf4197a8e3bd66623

Added to database: 3/23/2026, 1:30:51 AM

Last enriched: 3/23/2026, 1:45:55 AM

Last updated: 3/23/2026, 3:47:47 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses