A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM.
References
Link | Resource |
---|---|
https://hackandpwn.com/disclosures/CVE-2023-45883.pdf | Third Party Advisory |
https://www.vidyo.com/enterprise-video-management/qumu | Product |
https://hackandpwn.com/disclosures/CVE-2023-45883.pdf | Third Party Advisory |
https://www.vidyo.com/enterprise-video-management/qumu | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://hackandpwn.com/disclosures/CVE-2023-45883.pdf - Third Party Advisory | |
References | () https://www.vidyo.com/enterprise-video-management/qumu - Product |
12 Sep 2024, 19:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-19 13:15
Updated : 2024-11-21 08:27
NVD link : CVE-2023-45883
Mitre link : CVE-2023-45883
CVE.ORG link : CVE-2023-45883
JSON object : View
Products Affected
enghouse
- qumu
microsoft
- windows
CWE