CVE-2023-45883

A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:enghouse:qumu:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:27

Type Values Removed Values Added
References () https://hackandpwn.com/disclosures/CVE-2023-45883.pdf - Third Party Advisory () https://hackandpwn.com/disclosures/CVE-2023-45883.pdf - Third Party Advisory
References () https://www.vidyo.com/enterprise-video-management/qumu - Product () https://www.vidyo.com/enterprise-video-management/qumu - Product

12 Sep 2024, 19:35

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-19 13:15

Updated : 2024-11-21 08:27


NVD link : CVE-2023-45883

Mitre link : CVE-2023-45883

CVE.ORG link : CVE-2023-45883


JSON object : View

Products Affected

enghouse

  • qumu

microsoft

  • windows
CWE
NVD-CWE-noinfo CWE-269

Improper Privilege Management