CVE-2023-45883

A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:enghouse:qumu:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

12 Sep 2024, 19:35

Type Values Removed Values Added
CWE CWE-269

27 Oct 2023, 21:53

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE NVD-CWE-noinfo
First Time Microsoft windows
Enghouse
Microsoft
Enghouse qumu
References (MISC) https://hackandpwn.com/disclosures/CVE-2023-45883.pdf - (MISC) https://hackandpwn.com/disclosures/CVE-2023-45883.pdf - Third Party Advisory
References (MISC) https://www.vidyo.com/enterprise-video-management/qumu - (MISC) https://www.vidyo.com/enterprise-video-management/qumu - Product
CPE cpe:2.3:a:enghouse:qumu:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

19 Oct 2023, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-19 13:15

Updated : 2024-09-12 19:35


NVD link : CVE-2023-45883

Mitre link : CVE-2023-45883

CVE.ORG link : CVE-2023-45883


JSON object : View

Products Affected

enghouse

  • qumu

microsoft

  • windows
CWE
NVD-CWE-noinfo CWE-269

Improper Privilege Management