Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4606: CWE-250 Execution with unnecessary privileges in GeoVision GV-Edge Recording Manager

0
Critical
VulnerabilityCVE-2026-4606cvecve-2026-4606cwe-250
Published: Mon Mar 23 2026 (03/23/2026, 01:05:31 UTC)
Source: CVE Database V5
Vendor/Project: GeoVision
Product: GV-Edge Recording Manager

Description

CVE-2026-4606 is a critical local privilege escalation vulnerability in GeoVision's GV-Edge Recording Manager (ERM) version 2. 3. 1. The application improperly runs components with SYSTEM-level privileges, including Windows file dialogs invoked by functions like 'Import Data'. This allows any local user to execute actions with full SYSTEM privileges, enabling modification or deletion of protected system files. The vulnerability arises because ERM creates a Windows service running as LocalSystem and spawns processes under this context rather than the logged-in user's security context. Exploitation requires local access but no authentication or user interaction. This flaw can lead to full system compromise, making it a severe threat to organizations using this software. No known exploits are currently reported in the wild. Immediate patching or mitigation is critical to prevent potential attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:48:16 UTC

Technical Analysis

CVE-2026-4606 is a critical vulnerability identified in GeoVision's GV-Edge Recording Manager (ERM) version 2.3.1, categorized under CWE-250: Execution with Unnecessary Privileges. The root cause is that ERM installs a Windows service running under the LocalSystem account, which is the highest privilege level on Windows systems. When the ERM application launches, it spawns related processes that inherit SYSTEM-level privileges instead of running under the logged-in user's security context. This design flaw extends to application functions that invoke Windows file open/save dialogs, such as the 'Import Data' feature. These dialogs operate with SYSTEM privileges, allowing any local user to manipulate protected system files and directories, including modification or deletion. Because the vulnerability does not require authentication, user interaction, or elevated privileges initially, any local user can exploit it to escalate privileges to SYSTEM level. This can lead to full control over the operating system, enabling attackers to install malware, disable security controls, or exfiltrate sensitive data. The vulnerability has a CVSS 4.0 base score of 10.0, reflecting its critical severity and wide impact. Although no known exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a high-risk issue for organizations using GV-Edge Recording Manager 2.3.1.

Potential Impact

The impact of CVE-2026-4606 is severe for organizations worldwide using GV-Edge Recording Manager version 2.3.1. Since the vulnerability allows any local user to escalate privileges to SYSTEM level, it effectively grants full control over affected Windows systems. This can lead to unauthorized installation of persistent malware, disabling or bypassing of security mechanisms, unauthorized access to sensitive data, and potential lateral movement within networks. Systems running ERM in critical infrastructure environments such as surveillance, security monitoring, or physical access control are particularly at risk. The vulnerability undermines the principle of least privilege and can facilitate insider threats or attacks by adversaries who have gained limited local access. Given the critical nature of the flaw and the high privileges involved, exploitation could result in complete system compromise, data breaches, operational disruption, and significant remediation costs.

Mitigation Recommendations

To mitigate CVE-2026-4606, organizations should immediately upgrade GV-Edge Recording Manager to a patched version once released by GeoVision. Until a patch is available, implement the following specific measures: 1) Restrict local user access on systems running ERM to trusted administrators only, minimizing the risk of unprivileged users exploiting the flaw. 2) Use Windows Group Policy to limit access to the ERM service and related executables, preventing unauthorized execution. 3) Employ application whitelisting to control which processes can run with elevated privileges. 4) Monitor and audit local user activities on ERM hosts for suspicious behavior, especially file system changes involving protected directories. 5) Consider running ERM in a dedicated, isolated environment or virtual machine with strict access controls to contain potential exploitation. 6) Disable or restrict the use of ERM functions that invoke file dialogs until the vulnerability is resolved. 7) Implement endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts. These targeted mitigations go beyond generic advice by focusing on controlling local user privileges, restricting access to vulnerable components, and monitoring for exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GV
Date Reserved
2026-03-23T00:46:43.918Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c097cbf4197a8e3bd66623

Added to database: 3/23/2026, 1:30:51 AM

Last enriched: 3/30/2026, 8:48:16 PM

Last updated: 5/7/2026, 5:01:32 AM

Views: 166

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses