CVE-2024-36075

6.5 MEDIUM

📋 TL;DR

This vulnerability allows remote code execution with administrator privileges on endpoints running CoSoSys Endpoint Protector or Unify agent. An attacker who can modify archives on the server can execute arbitrary code on connected endpoints. Organizations using these products through version 5.9.3 (Endpoint Protector) or 7.0.6 (Unify agent) are affected.

💻 Affected Systems

Products:
  • CoSoSys Endpoint Protector
  • CoSoSys Unify agent
Versions: Endpoint Protector through 5.9.3, Unify agent through 7.0.6
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using the vulnerable versions are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all endpoints with administrator privileges, enabling data theft, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Targeted attacks against specific endpoints to steal sensitive data or establish foothold for lateral movement within the network.

🟢

If Mitigated

Limited impact through network segmentation and strict access controls preventing server archive modification.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to modify archives on the server, suggesting some level of access or compromise is needed first.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Endpoint Protector 5.9.4+, Unify agent 7.0.7+

Vendor Advisory: https://helpcenter.netwrix.com/bundle/z-kb-articles-salesforce/page/kA0Qk0000001E5lKAE.html

Restart Required: Yes

Instructions:

1. Download latest version from vendor portal. 2. Backup current configuration. 3. Install update on server first. 4. Deploy updated agent to all endpoints. 5. Verify all endpoints are reporting correct version.

🔧 Temporary Workarounds

Restrict Server Access

all

Limit access to the Endpoint Protector/Unify server to only authorized administrators.

Monitor Archive Changes

all

Implement file integrity monitoring on server archive directories.

🧯 If You Can't Patch

  • Segment the Endpoint Protector/Unify server network to limit lateral movement potential
  • Implement strict access controls and monitoring for server administrative interfaces

🔍 How to Verify

Check if Vulnerable:

Check agent version in Endpoint Protector/Unify management console or run agent version check command on endpoints.

Check Version:

On Windows: 'sc query EndpointProtectorAgent' or check installed programs. On Linux: 'rpm -qa | grep endpoint' or 'dpkg -l | grep endpoint'.

Verify Fix Applied:

Confirm all endpoints report version 5.9.4+ (Endpoint Protector) or 7.0.7+ (Unify agent) in management console.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected archive extraction events
  • Unusual process execution from agent directories
  • Failed agent update attempts

Network Indicators:

  • Unusual outbound connections from endpoints following agent communication
  • Anomalous traffic patterns to/from Endpoint Protector server

SIEM Query:

source="endpoint_protector" AND (event_type="archive_extract" OR process_execution="*agent*" AND parent_process!="expected_parent")

🔗 References

📤 Share & Export