CVE-2023-45883

7.8 HIGH

📋 TL;DR

This vulnerability allows standard Windows users to escalate privileges to SYSTEM level by triggering a software repair process in Qumu Multicast Extension v2. When users initiate a repair, a pop-up window opens with SYSTEM privileges, enabling arbitrary code execution. This affects organizations using vulnerable versions of Qumu Multicast Extension v2 on Windows systems.

💻 Affected Systems

Products:
  • Qumu Multicast Extension v2
Versions: All versions before 2.0.63
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires standard user access to trigger software repair functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full SYSTEM privileges on affected Windows systems, enabling complete system compromise, data theft, lateral movement, and persistence establishment.

🟠

Likely Case

Malicious insiders or compromised user accounts escalate privileges to SYSTEM to install malware, steal credentials, or bypass security controls.

🟢

If Mitigated

Limited impact if systems are patched, users have minimal privileges, and repair functionality is restricted.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires standard user access and ability to trigger repair process. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.63 or later

Vendor Advisory: https://www.vidyo.com/enterprise-video-management/qumu

Restart Required: Yes

Instructions:

1. Download Qumu Multicast Extension v2 version 2.0.63 or later from vendor. 2. Install update on all affected Windows systems. 3. Restart systems to complete installation.

🔧 Temporary Workarounds

Restrict Repair Permissions

windows

Prevent standard users from triggering software repair through group policy or permissions.

Use Group Policy to restrict access to repair functionality or modify file permissions on repair executables.

Remove Standard User Access

windows

Limit user accounts to minimal necessary privileges on affected systems.

Review and reduce user privileges using local security policy or Active Directory.

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit standard user capabilities
  • Monitor for repair process execution and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check installed version of Qumu Multicast Extension v2 via Programs and Features or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Qumu\MulticastExtension

Check Version:

reg query "HKLM\SOFTWARE\Qumu\MulticastExtension" /v Version

Verify Fix Applied:

Confirm version is 2.0.63 or higher and test that repair process no longer grants SYSTEM privileges.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing repair process execution, privilege escalation attempts, or unexpected SYSTEM-level processes from user accounts.

Network Indicators:

  • Unusual outbound connections from affected systems post-exploitation.

SIEM Query:

EventID=4688 AND ProcessName contains "repair" OR "setup" AND NewProcessName contains "cmd.exe" OR "powershell.exe"

🔗 References

📤 Share & Export