CVE-2026-4606
Received Received - Intake
Local Privilege Escalation in GV Edge ERM via SYSTEM-Level Service

Publication date: 2026-03-23

Last updated on: 2026-03-23

Assigner: 0df08a0e-a200-4957-9bb0-084f562506f9

Description
GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system.  During installation, ERM creates a Windows service that runs under the LocalSystem account.  When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context of the logged-in user.  Functions such as 'Import Data' open a Windows file dialog operating with SYSTEM permissions, enabling modification or deletion of protected system files and directories.  Any ERM function invoking Windows file open/save dialogs exposes the same risk.  This vulnerability allows local privilege escalation and may result in full system compromise.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Affected Vendors & Products
Vendor Product Version
gv_edge_recording_manager erm 2.3.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-250 The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

GV Edge Recording Manager (ERM) version 2.3.1 runs application components with SYSTEM-level privileges improperly. This means that any local user on the system can gain full control over the operating system.

During installation, ERM creates a Windows service that runs under the LocalSystem account. When the ERM application is launched, its related processes run with SYSTEM privileges instead of the logged-in user's security context.

Functions like 'Import Data' open Windows file dialogs that operate with SYSTEM permissions, allowing modification or deletion of protected system files and directories. Any ERM function that invokes Windows file open/save dialogs exposes this risk.

Overall, this vulnerability allows local privilege escalation and may lead to full system compromise.


How can this vulnerability impact me? :

This vulnerability can allow any local user to escalate their privileges to SYSTEM level, effectively gaining full control over the affected operating system.

With SYSTEM-level access, an attacker can modify or delete protected system files and directories, potentially leading to system instability, data loss, or unauthorized access to sensitive information.

The full system compromise risk means that attackers could install malware, create backdoors, or disrupt normal system operations.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart
Meta Information
CVE Publication Date:
2026-03-23
CVE Last Modified Date:
2026-03-23
Report Generation Date:
2026-03-24
AI Powered Q&A Generation:
2026-03-23
EPSS Last Evaluated Date:
N/A
NVD Report Link:
EUVD Report Link: