CVE-2025-54393

5.4 MEDIUM

📋 TL;DR

CVE-2025-54393 is a static code injection vulnerability in Netwrix Directory Manager (formerly Imanami GroupID) that allows authenticated users to execute arbitrary code and gain administrative privileges. This affects organizations using vulnerable versions of the software for Active Directory management. Attackers with valid user credentials can escalate privileges to full system control.

💻 Affected Systems

Products:
  • Netwrix Directory Manager
  • Imanami GroupID
Versions: 11.0.0.0 through 11.1.25162.01
Operating Systems: Windows Server (typically)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access; typically deployed in enterprise Active Directory environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete domain compromise through administrative access, allowing attackers to create/delete accounts, modify permissions, and potentially pivot to other systems.

🟠

Likely Case

Privilege escalation leading to unauthorized administrative actions within the directory management system, potentially enabling further lateral movement.

🟢

If Mitigated

Limited impact if strong authentication controls, network segmentation, and least privilege principles are properly implemented.

🌐 Internet-Facing: MEDIUM - While authentication is required, exposed instances could be targeted by credential stuffing or phishing attacks.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can easily exploit this to gain administrative privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but the injection mechanism appears straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.1.25162.02 or later

Vendor Advisory: https://community.netwrix.com/t/adv-2025-015-critical-vulnerabilities-in-netwrix-directory-manager-formerly-imanami-groupid-v11/17192

Restart Required: No

Instructions:

1. Download the latest version from Netwrix support portal. 2. Run the installer to upgrade. 3. Verify the version is 11.1.25162.02 or higher.

🔧 Temporary Workarounds

Restrict Access Controls

all

Implement strict access controls and network segmentation to limit which users can access the Directory Manager interface.

Enhanced Monitoring

all

Enable detailed logging and monitor for unusual administrative actions or privilege escalation attempts.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Directory Manager from general network access.
  • Enforce multi-factor authentication and review all user accounts with access to the system.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Netwrix Directory Manager via the application interface or Windows Programs and Features.

Check Version:

Check via application GUI or Windows registry: HKEY_LOCAL_MACHINE\SOFTWARE\Netwrix\Directory Manager\Version

Verify Fix Applied:

Confirm the version is 11.1.25162.02 or higher and test that authenticated users cannot perform administrative actions without proper authorization.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected administrative actions by non-admin users
  • Multiple failed authentication attempts followed by successful login and privilege escalation

Network Indicators:

  • Unusual traffic patterns to Directory Manager ports from unexpected sources

SIEM Query:

source="netwrix-directory-manager" AND (event_type="privilege_escalation" OR user_role_change="admin")

🔗 References

📤 Share & Export