CVE-2026-4606: CWE-250 Execution with unnecessary privileges in GeoVision GV-Edge Recording Manager
CVE-2026-4606 is a critical local privilege escalation vulnerability in GeoVision's GV-Edge Recording Manager (ERM) version 2. 3. 1. The application improperly runs components with SYSTEM-level privileges, including Windows file dialogs invoked by functions like 'Import Data'. This allows any local user to execute actions with full SYSTEM privileges, enabling modification or deletion of protected system files. The vulnerability arises because ERM creates a Windows service running as LocalSystem and spawns processes under this context rather than the logged-in user's security context. Exploitation requires local access but no authentication or user interaction. This flaw can lead to full system compromise, making it a severe threat to organizations using this software. No known exploits are currently reported in the wild. Immediate patching or mitigation is critical to prevent potential attacks.
AI Analysis
Technical Summary
CVE-2026-4606 is a critical vulnerability identified in GeoVision's GV-Edge Recording Manager (ERM) version 2.3.1, categorized under CWE-250: Execution with Unnecessary Privileges. The root cause is that ERM installs a Windows service running under the LocalSystem account, which is the highest privilege level on Windows systems. When the ERM application launches, it spawns related processes that inherit SYSTEM-level privileges instead of running under the logged-in user's security context. This design flaw extends to application functions that invoke Windows file open/save dialogs, such as the 'Import Data' feature. These dialogs operate with SYSTEM privileges, allowing any local user to manipulate protected system files and directories, including modification or deletion. Because the vulnerability does not require authentication, user interaction, or elevated privileges initially, any local user can exploit it to escalate privileges to SYSTEM level. This can lead to full control over the operating system, enabling attackers to install malware, disable security controls, or exfiltrate sensitive data. The vulnerability has a CVSS 4.0 base score of 10.0, reflecting its critical severity and wide impact. Although no known exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a high-risk issue for organizations using GV-Edge Recording Manager 2.3.1.
Potential Impact
The impact of CVE-2026-4606 is severe for organizations worldwide using GV-Edge Recording Manager version 2.3.1. Since the vulnerability allows any local user to escalate privileges to SYSTEM level, it effectively grants full control over affected Windows systems. This can lead to unauthorized installation of persistent malware, disabling or bypassing of security mechanisms, unauthorized access to sensitive data, and potential lateral movement within networks. Systems running ERM in critical infrastructure environments such as surveillance, security monitoring, or physical access control are particularly at risk. The vulnerability undermines the principle of least privilege and can facilitate insider threats or attacks by adversaries who have gained limited local access. Given the critical nature of the flaw and the high privileges involved, exploitation could result in complete system compromise, data breaches, operational disruption, and significant remediation costs.
Mitigation Recommendations
To mitigate CVE-2026-4606, organizations should immediately upgrade GV-Edge Recording Manager to a patched version once released by GeoVision. Until a patch is available, implement the following specific measures: 1) Restrict local user access on systems running ERM to trusted administrators only, minimizing the risk of unprivileged users exploiting the flaw. 2) Use Windows Group Policy to limit access to the ERM service and related executables, preventing unauthorized execution. 3) Employ application whitelisting to control which processes can run with elevated privileges. 4) Monitor and audit local user activities on ERM hosts for suspicious behavior, especially file system changes involving protected directories. 5) Consider running ERM in a dedicated, isolated environment or virtual machine with strict access controls to contain potential exploitation. 6) Disable or restrict the use of ERM functions that invoke file dialogs until the vulnerability is resolved. 7) Implement endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts. These targeted mitigations go beyond generic advice by focusing on controlling local user privileges, restricting access to vulnerable components, and monitoring for exploitation attempts.
Affected Countries
United States, China, Japan, South Korea, Germany, United Kingdom, France, Canada, Australia, India
CVE-2026-4606: CWE-250 Execution with unnecessary privileges in GeoVision GV-Edge Recording Manager
Description
CVE-2026-4606 is a critical local privilege escalation vulnerability in GeoVision's GV-Edge Recording Manager (ERM) version 2. 3. 1. The application improperly runs components with SYSTEM-level privileges, including Windows file dialogs invoked by functions like 'Import Data'. This allows any local user to execute actions with full SYSTEM privileges, enabling modification or deletion of protected system files. The vulnerability arises because ERM creates a Windows service running as LocalSystem and spawns processes under this context rather than the logged-in user's security context. Exploitation requires local access but no authentication or user interaction. This flaw can lead to full system compromise, making it a severe threat to organizations using this software. No known exploits are currently reported in the wild. Immediate patching or mitigation is critical to prevent potential attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-4606 is a critical vulnerability identified in GeoVision's GV-Edge Recording Manager (ERM) version 2.3.1, categorized under CWE-250: Execution with Unnecessary Privileges. The root cause is that ERM installs a Windows service running under the LocalSystem account, which is the highest privilege level on Windows systems. When the ERM application launches, it spawns related processes that inherit SYSTEM-level privileges instead of running under the logged-in user's security context. This design flaw extends to application functions that invoke Windows file open/save dialogs, such as the 'Import Data' feature. These dialogs operate with SYSTEM privileges, allowing any local user to manipulate protected system files and directories, including modification or deletion. Because the vulnerability does not require authentication, user interaction, or elevated privileges initially, any local user can exploit it to escalate privileges to SYSTEM level. This can lead to full control over the operating system, enabling attackers to install malware, disable security controls, or exfiltrate sensitive data. The vulnerability has a CVSS 4.0 base score of 10.0, reflecting its critical severity and wide impact. Although no known exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a high-risk issue for organizations using GV-Edge Recording Manager 2.3.1.
Potential Impact
The impact of CVE-2026-4606 is severe for organizations worldwide using GV-Edge Recording Manager version 2.3.1. Since the vulnerability allows any local user to escalate privileges to SYSTEM level, it effectively grants full control over affected Windows systems. This can lead to unauthorized installation of persistent malware, disabling or bypassing of security mechanisms, unauthorized access to sensitive data, and potential lateral movement within networks. Systems running ERM in critical infrastructure environments such as surveillance, security monitoring, or physical access control are particularly at risk. The vulnerability undermines the principle of least privilege and can facilitate insider threats or attacks by adversaries who have gained limited local access. Given the critical nature of the flaw and the high privileges involved, exploitation could result in complete system compromise, data breaches, operational disruption, and significant remediation costs.
Mitigation Recommendations
To mitigate CVE-2026-4606, organizations should immediately upgrade GV-Edge Recording Manager to a patched version once released by GeoVision. Until a patch is available, implement the following specific measures: 1) Restrict local user access on systems running ERM to trusted administrators only, minimizing the risk of unprivileged users exploiting the flaw. 2) Use Windows Group Policy to limit access to the ERM service and related executables, preventing unauthorized execution. 3) Employ application whitelisting to control which processes can run with elevated privileges. 4) Monitor and audit local user activities on ERM hosts for suspicious behavior, especially file system changes involving protected directories. 5) Consider running ERM in a dedicated, isolated environment or virtual machine with strict access controls to contain potential exploitation. 6) Disable or restrict the use of ERM functions that invoke file dialogs until the vulnerability is resolved. 7) Implement endpoint detection and response (EDR) solutions capable of detecting privilege escalation attempts. These targeted mitigations go beyond generic advice by focusing on controlling local user privileges, restricting access to vulnerable components, and monitoring for exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GV
- Date Reserved
- 2026-03-23T00:46:43.918Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c097cbf4197a8e3bd66623
Added to database: 3/23/2026, 1:30:51 AM
Last enriched: 3/30/2026, 8:48:16 PM
Last updated: 5/7/2026, 5:01:32 AM
Views: 166
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.