CVE-2022-31199

Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.
References
Link Resource
https://bishopfox.com/blog/netwrix-auditor-advisory Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:netwrix:auditor:*:*:*:*:*:*:*:*

History

09 Nov 2022, 19:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CWE CWE-502
References (MISC) https://bishopfox.com/blog/netwrix-auditor-advisory - (MISC) https://bishopfox.com/blog/netwrix-auditor-advisory - Exploit, Third Party Advisory
CPE cpe:2.3:a:netwrix:auditor:*:*:*:*:*:*:*:*

08 Nov 2022, 03:04

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-08 01:15

Updated : 2024-02-04 22:51


NVD link : CVE-2022-31199

Mitre link : CVE-2022-31199

CVE.ORG link : CVE-2022-31199


JSON object : View

Products Affected

netwrix

  • auditor
CWE
CWE-502

Deserialization of Untrusted Data