CVE-2023-45883
📋 TL;DR
This vulnerability allows standard Windows users to escalate privileges to SYSTEM level by triggering a software repair process in Qumu Multicast Extension v2. When users initiate a repair, a pop-up window opens with SYSTEM privileges, enabling arbitrary code execution. This affects organizations using vulnerable versions of Qumu Multicast Extension v2 on Windows systems.
💻 Affected Systems
- Qumu Multicast Extension v2
📦 What is this software?
Qumu by Enghouse
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full SYSTEM privileges on affected Windows systems, enabling complete system compromise, data theft, lateral movement, and persistence establishment.
Likely Case
Malicious insiders or compromised user accounts escalate privileges to SYSTEM to install malware, steal credentials, or bypass security controls.
If Mitigated
Limited impact if systems are patched, users have minimal privileges, and repair functionality is restricted.
🎯 Exploit Status
Exploitation requires standard user access and ability to trigger repair process. Public disclosure includes technical details.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.0.63 or later
Vendor Advisory: https://www.vidyo.com/enterprise-video-management/qumu
Restart Required: Yes
Instructions:
1. Download Qumu Multicast Extension v2 version 2.0.63 or later from vendor. 2. Install update on all affected Windows systems. 3. Restart systems to complete installation.
🔧 Temporary Workarounds
Restrict Repair Permissions
windowsPrevent standard users from triggering software repair through group policy or permissions.
Use Group Policy to restrict access to repair functionality or modify file permissions on repair executables.
Remove Standard User Access
windowsLimit user accounts to minimal necessary privileges on affected systems.
Review and reduce user privileges using local security policy or Active Directory.
🧯 If You Can't Patch
- Implement strict least privilege access controls to limit standard user capabilities
- Monitor for repair process execution and privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check installed version of Qumu Multicast Extension v2 via Programs and Features or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Qumu\MulticastExtension
Check Version:
reg query "HKLM\SOFTWARE\Qumu\MulticastExtension" /v Version
Verify Fix Applied:
Confirm version is 2.0.63 or higher and test that repair process no longer grants SYSTEM privileges.
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs showing repair process execution, privilege escalation attempts, or unexpected SYSTEM-level processes from user accounts.
Network Indicators:
- Unusual outbound connections from affected systems post-exploitation.
SIEM Query:
EventID=4688 AND ProcessName contains "repair" OR "setup" AND NewProcessName contains "cmd.exe" OR "powershell.exe"