CVE-2025-47748

5.3 MEDIUM

📋 TL;DR

Netwrix Directory Manager versions 11.0.0.0 and earlier, plus versions after 11.1.25134.03, contain a hardcoded password vulnerability (CWE-259). This allows attackers with access to the system to potentially gain unauthorized administrative privileges. Organizations using affected versions of Netwrix Directory Manager are at risk.

💻 Affected Systems

Products:
  • Netwrix Directory Manager (formerly Imanami GroupID)
Versions: v11.0.0.0 and earlier, plus versions after 11.1.25134.03
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the software itself regardless of configuration. All installations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the directory management system, allowing attackers to modify user permissions, create backdoors, and potentially pivot to other systems in the domain.

🟠

Likely Case

Unauthorized administrative access to the Directory Manager application, enabling configuration changes, privilege escalation, and data exfiltration.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized access to the management interface.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the system where the hardcoded credentials can be discovered and used. No authentication bypass is involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 11.1.25134.03

Vendor Advisory: https://community.netwrix.com/t/adv-2025-014-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/13951

Restart Required: Yes

Instructions:

1. Download the patched version 11.1.25134.03 from Netwrix. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the Directory Manager service. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the Directory Manager management interface to authorized administrative networks only.

Access Control Lists

windows

Implement strict firewall rules and Windows Firewall policies to limit source IP addresses that can connect to the Directory Manager service.

netsh advfirewall firewall add rule name="Restrict Directory Manager" dir=in action=allow protocol=TCP localport=<port> remoteip=<authorized_ips>

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Directory Manager server from non-administrative networks.
  • Monitor authentication logs for unauthorized access attempts and implement alerting for suspicious login patterns.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Netwrix Directory Manager via the application interface or Windows Programs and Features. If version is 11.0.0.0 or earlier, or any version after 11.1.25134.03, the system is vulnerable.

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Netwrix Directory Manager*"} | Select-Object Name, Version

Verify Fix Applied:

Confirm the installed version is exactly 11.1.25134.03. Test administrative functionality to ensure the patch didn't break core features.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts to the Directory Manager service
  • Configuration changes made from unexpected IP addresses or user accounts
  • Failed login attempts followed by successful logins from the same source

Network Indicators:

  • Unexpected network connections to the Directory Manager service port from unauthorized IP ranges
  • Traffic patterns indicating brute force attempts

SIEM Query:

source="directory_manager.log" (event_type="authentication" AND (result="success" AND src_ip NOT IN [authorized_admin_ips]))

🔗 References

📤 Share & Export