{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-4606","assignerOrgId":"0df08a0e-a200-4957-9bb0-084f562506f9","state":"PUBLISHED","assignerShortName":"GV","dateReserved":"2026-03-23T00:46:43.918Z","datePublished":"2026-03-23T01:05:31.952Z","dateUpdated":"2026-03-24T03:56:02.798Z"},"containers":{"cna":{"providerMetadata":{"orgId":"0df08a0e-a200-4957-9bb0-084f562506f9","shortName":"GV","dateUpdated":"2026-03-23T01:15:18.367Z"},"title":"GeoVision ERM Improper Privilege Assignment Leads to SYSTEM-Level Privilege","datePublic":"2026-03-23T01:15:00.000Z","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-250","description":"CWE-250 Execution with unnecessary privileges","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-113","descriptions":[{"lang":"en","value":"CAPEC-113 Interface Manipulation"}]}],"affected":[{"vendor":"GeoVision","product":"GV-Edge Recording Manager","platforms":["Windows"],"collectionURL":"https://www.geovision.com.tw/download/product/GV%E2%80%90Edge%20Recording%20Manager%20(Windows%20Version)","packageName":"GV-Edge Recording Manager","versions":[{"status":"affected","version":"2.3.1"},{"status":"unaffected","version":"2.3.2"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system. \n\nDuring installation, ERM creates a Windows service that runs under the LocalSystem account. \n\nWhen the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context of the logged-in user. \n\nFunctions such as 'Import Data' open a Windows file dialog operating with SYSTEM permissions, enabling modification or deletion of protected system files and directories. \n\nAny ERM function invoking Windows file open/save dialogs exposes the same risk. \n\nThis vulnerability allows local privilege escalation and may result in full system compromise.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>GV Edge Recording Manager (ERM) v2.3.1 improperly runs application components with SYSTEM-level privileges, allowing any local user to gain full control of the operating system.&nbsp;</p><p>During installation, ERM creates a Windows service that runs under the LocalSystem account.&nbsp;</p><p>When the ERM application is launched, related processes are spawned under SYSTEM privileges rather than the security context of the logged-in user.&nbsp;</p><p>Functions such as 'Import Data' open a Windows file dialog operating with SYSTEM permissions, enabling modification or deletion of protected system files and directories.&nbsp;</p><p>Any ERM function invoking Windows file open/save dialogs exposes the same risk.&nbsp;</p><p>This vulnerability allows local privilege escalation and may result in full system compromise.</p>"}]}],"references":[{"url":"https://https://www.geovision.com.tw/cyber_security.php"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","subConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"HIGH","exploitMaturity":"NOT_DEFINED","Safety":"NEGLIGIBLE","Automatable":"NO","Recovery":"IRRECOVERABLE","valueDensity":"CONCENTRATED","vulnerabilityResponseEffort":"MODERATE","providerUrgency":"GREEN","version":"4.0","baseSeverity":"CRITICAL","baseScore":10,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:N/R:I/V:C/RE:M/U:Green"}}],"credits":[{"lang":"en","value":"Reported by security researcher Chao Liu (chaoliu@rbbusa.com)","type":"finder"}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 1.0.1"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-23T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2026-4606"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-24T03:56:02.798Z"}}]}}