CVE-2025-48748

10.0 CRITICAL

📋 TL;DR

Netwrix Directory Manager (formerly Imanami GroupID) versions through 10.0.7784.0 contain a hard-coded password vulnerability. This allows attackers to gain unauthorized access to the system using the embedded credentials. All organizations running affected versions are vulnerable.

💻 Affected Systems

Products:
  • Netwrix Directory Manager
  • Imanami GroupID
Versions: All versions through 10.0.7784.0
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability exists in the default installation and configuration of affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the directory management system, allowing attackers to modify user accounts, groups, and permissions across the entire Active Directory environment.

🟠

Likely Case

Unauthorized access to the directory management console, enabling attackers to create/delete accounts, escalate privileges, and exfiltrate sensitive directory data.

🟢

If Mitigated

Limited impact if system is isolated, monitored, and access is restricted, though the hard-coded credential remains a persistent backdoor.

🌐 Internet-Facing: HIGH if the management interface is exposed to the internet, as attackers can directly exploit the hard-coded credentials.
🏢 Internal Only: HIGH as any internal attacker or compromised account can use the hard-coded password to gain administrative access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hard-coded password, which may be discovered through reverse engineering or leaked information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 10.0.7785.0 or later

Vendor Advisory: https://community.netwrix.com/t/adv-2025-013-hard-coded-password-in-netwrix-directory-manager-formerly-imanami-groupid-v10-and-earlier/13945

Restart Required: Yes

Instructions:

1. Download the latest version from Netwrix support portal. 2. Backup current configuration. 3. Run the installer to upgrade. 4. Restart the Netwrix Directory Manager service. 5. Verify the new version is running.

🔧 Temporary Workarounds

Network Isolation

windows

Restrict network access to the management interface to only trusted administrative networks.

Use Windows Firewall or network ACLs to block all inbound connections except from authorized management IPs

Credential Rotation

windows

Change the hard-coded password if the system allows password modification (though this may break functionality).

Check Netwrix documentation for password change procedures

🧯 If You Can't Patch

  • Immediately isolate the system from all non-essential networks and implement strict network segmentation
  • Implement enhanced monitoring and alerting for any access to the directory management interface

🔍 How to Verify

Check if Vulnerable:

Check the installed version in Control Panel > Programs and Features. If version is 10.0.7784.0 or earlier, the system is vulnerable.

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*Netwrix Directory Manager*'} | Select-Object Name, Version

Verify Fix Applied:

Verify the version is 10.0.7785.0 or later and attempt to authenticate with previously known hard-coded credentials (should fail).

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login with specific username patterns
  • Unusual administrative actions from non-standard accounts

Network Indicators:

  • Authentication requests to the management interface from unexpected source IPs
  • Burst of directory modification requests

SIEM Query:

source="netwrix" AND (event_type="authentication" AND result="success") | stats count by user, src_ip

🔗 References

📤 Share & Export