Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.
References
Link | Resource |
---|---|
https://bishopfox.com/blog/netwrix-auditor-advisory | Exploit Third Party Advisory |
https://bishopfox.com/blog/netwrix-auditor-advisory | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://bishopfox.com/blog/netwrix-auditor-advisory - Exploit, Third Party Advisory |
Information
Published : 2022-11-08 01:15
Updated : 2024-11-21 07:04
NVD link : CVE-2022-31199
Mitre link : CVE-2022-31199
CVE.ORG link : CVE-2022-31199
JSON object : View
Products Affected
netwrix
- auditor
CWE
CWE-502
Deserialization of Untrusted Data