CVE-2022-31199

Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.
References
Link Resource
https://bishopfox.com/blog/netwrix-auditor-advisory Exploit Third Party Advisory
https://bishopfox.com/blog/netwrix-auditor-advisory Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:netwrix:auditor:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:04

Type Values Removed Values Added
References () https://bishopfox.com/blog/netwrix-auditor-advisory - Exploit, Third Party Advisory () https://bishopfox.com/blog/netwrix-auditor-advisory - Exploit, Third Party Advisory

Information

Published : 2022-11-08 01:15

Updated : 2024-11-21 07:04


NVD link : CVE-2022-31199

Mitre link : CVE-2022-31199

CVE.ORG link : CVE-2022-31199


JSON object : View

Products Affected

netwrix

  • auditor
CWE
CWE-502

Deserialization of Untrusted Data