CVE-2024-36073

7.2 HIGH

📋 TL;DR

This vulnerability allows an attacker with administrative access to the Netwrix CoSoSys Endpoint Protector or Unify server to execute arbitrary system commands with SYSTEM/root privileges on any client endpoint. It affects organizations using these products for endpoint security and data loss prevention. The attack requires administrative server credentials but provides complete control over client systems.

💻 Affected Systems

Products:
  • Netwrix CoSoSys Endpoint Protector
  • Netwrix CoSoSys Unify
Versions: Endpoint Protector through 5.9.3, Unify through 7.0.6
Operating Systems: Windows, Linux, macOS (client endpoints)
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. The attack requires administrative access to the management server but affects all connected client endpoints regardless of their OS.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all client endpoints, allowing data theft, ransomware deployment, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Targeted compromise of specific endpoints by malicious insiders or attackers who have gained administrative access to the management server.

🟢

If Mitigated

Limited to authorized administrative actions only, with proper access controls and monitoring preventing unauthorized exploitation.

🌐 Internet-Facing: LOW - The vulnerability requires administrative access to the management server, which typically should not be internet-facing.
🏢 Internal Only: HIGH - The risk is significant within internal networks where attackers with administrative credentials or compromised admin accounts can exploit it.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrative credentials for the management server but is straightforward once those credentials are obtained. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Endpoint Protector 5.9.4+, Unify 7.0.7+

Vendor Advisory: https://helpcenter.netwrix.com/bundle/z-kb-articles-salesforce/page/kA0Qk0000001E5lKAE.html

Restart Required: Yes

Instructions:

1. Download the latest version from Netwrix support portal. 2. Backup current configuration. 3. Install the update on the management server. 4. Deploy updated agents to all endpoints. 5. Restart both server and client systems.

🔧 Temporary Workarounds

Restrict Administrative Access

all

Limit administrative access to the management server to only essential personnel using principle of least privilege.

Network Segmentation

all

Isolate the management server from general network access and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement multi-factor authentication for all administrative accounts
  • Monitor and audit all administrative actions on the management server

🔍 How to Verify

Check if Vulnerable:

Check the version of Endpoint Protector (must be ≤5.9.3) or Unify (must be ≤7.0.6) on the management server.

Check Version:

On Windows: Check Add/Remove Programs or run 'wmic product get name,version'. On Linux: Check package manager or installed software list.

Verify Fix Applied:

Verify the management server is running Endpoint Protector 5.9.4+ or Unify 7.0.7+ and all client agents have been updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative login attempts
  • Configuration file modifications
  • Unexpected agent communication patterns
  • Suspicious command execution on endpoints

Network Indicators:

  • Unusual traffic between management server and endpoints
  • Unexpected outbound connections from endpoints

SIEM Query:

source="netwrix*" AND (event_type="admin_login" OR event_type="config_change" OR event_type="remote_command")

🔗 References

📤 Share & Export