← Zuruck zu CVEs
CVE-2022-31199
CRITICALCISA KEV9.8
Beschreibung
Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht11/8/2022
Zuletzt geandert11/3/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerNetwrix
ProduktAuditor
SchwachstellennameNetwrix Auditor Insecure Object Deserialization Vulnerability
KEV Aufnahmedatum2023-07-11
Behebungsfrist2023-08-01
Ransomware-NutzungKnown
Betroffene Produkte
netwrix:auditor
Schwachen (CWE)
CWE-502CWE-502
Referenzen
https://bishopfox.com/blog/netwrix-auditor-advisory(cve@mitre.org)
https://bishopfox.com/blog/netwrix-auditor-advisory(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-31199(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.