CVE-2026-4606
Local Privilege Escalation in GV Edge ERM via SYSTEM-Level Service
Publication date: 2026-03-23
Last updated on: 2026-03-23
Assigner: 0df08a0e-a200-4957-9bb0-084f562506f9
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Affected Vendors & Products
| Vendor | Product | Version |
|---|---|---|
| gv_edge_recording_manager | erm | 2.3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-250 | The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
GV Edge Recording Manager (ERM) version 2.3.1 runs application components with SYSTEM-level privileges improperly. This means that any local user on the system can gain full control over the operating system.
During installation, ERM creates a Windows service that runs under the LocalSystem account. When the ERM application is launched, its related processes run with SYSTEM privileges instead of the logged-in user's security context.
Functions like 'Import Data' open Windows file dialogs that operate with SYSTEM permissions, allowing modification or deletion of protected system files and directories. Any ERM function that invokes Windows file open/save dialogs exposes this risk.
Overall, this vulnerability allows local privilege escalation and may lead to full system compromise.
How can this vulnerability impact me? :
This vulnerability can allow any local user to escalate their privileges to SYSTEM level, effectively gaining full control over the affected operating system.
With SYSTEM-level access, an attacker can modify or delete protected system files and directories, potentially leading to system instability, data loss, or unauthorized access to sensitive information.
The full system compromise risk means that attackers could install malware, create backdoors, or disrupt normal system operations.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know