Vulnerability Description
A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM privileges. Standard users may use this to gain arbitrary code execution as SYSTEM.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Enghouse | Qumu | >= 2.0.0, < 2.0.63 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://hackandpwn.com/disclosures/CVE-2023-45883.pdfThird Party Advisory
- https://www.vidyo.com/enterprise-video-management/qumuProduct
- https://hackandpwn.com/disclosures/CVE-2023-45883.pdfThird Party Advisory
- https://www.vidyo.com/enterprise-video-management/qumuProduct
FAQ
What is CVE-2023-45883?
CVE-2023-45883 is a vulnerability with a CVSS score of 7.8 (HIGH). A privilege escalation vulnerability exists within the Qumu Multicast Extension v2 before 2.0.63 for Windows. When a standard user triggers a repair of the software, a pop-up window opens with SYSTEM ...
How severe is CVE-2023-45883?
CVE-2023-45883 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45883?
Check the references section above for vendor advisories and patch information. Affected products include: Enghouse Qumu, Microsoft Windows.