During installation, ERM creates a Windows service that runs under the LocalSystem account.
When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context of the logged-in user.
Functions such as 'Import Data' open a Windows file dialog operating with SYSTEM permissions, enabling modification or deletion of protected system files and directories.
Any ERM function invoking Windows file open/save dialogs exposes the same risk.
This vulnerability allows local privilege escalation and may result in full system compromise.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://https://www.geovision.com.tw/cyber_security.php |
|
Mon, 23 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Geovision
Geovision gv-edge Recording Manager |
|
| Vendors & Products |
Geovision
Geovision gv-edge Recording Manager |
Mon, 23 Mar 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system. During installation, ERM creates a Windows service that runs under the LocalSystem account. When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context of the logged-in user. Functions such as 'Import Data' open a Windows file dialog operating with SYSTEM permissions, enabling modification or deletion of protected system files and directories. Any ERM function invoking Windows file open/save dialogs exposes the same risk. This vulnerability allows local privilege escalation and may result in full system compromise. | |
| Title | GeoVision ERM Improper Privilege Assignment Leads to SYSTEM-Level Privilege | |
| Weaknesses | CWE-250 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GV
Published:
Updated: 2026-03-23T13:35:13.505Z
Reserved: 2026-03-23T00:46:43.918Z
Link: CVE-2026-4606
Updated: 2026-03-23T13:35:10.273Z
Status : Awaiting Analysis
Published: 2026-03-23T02:16:05.213
Modified: 2026-03-23T14:31:37.267
Link: CVE-2026-4606
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:45:43Z