Researchers have revealed details of a security vulnerability in the Netwrix Auditor application which, if successfully exploited, could lead to the execution of arbitrary code on affected devices.
“Since this service is typically run with extended privileges in an Active Directory environment, the attacker would likely be able to compromise the Active Directory domain,” Bishop Fox said in an advisory published this week.
Auditor is an auditing and visibility platform that allows organizations to have a consolidated view of their IT environments, including Active Directory, Exchange, file servers, SharePoint, VMware and other systems, all from a single console.
Netwrix, the company behind the software, claims more than 11,500 customers in over 100 countries, such as Airbus, Virgin, King’s College Hospital, and Credissimo, among others.
The flaw, which affects all supported versions prior to 10.5, has been described as insecure object deserialization, which occurs when untrusted user-controllable data is parsed to inflict code execution attacks. from a distance.
The root cause of the bug is an insecure .NET remoting service accessible on TCP port 9004 on the Netwrix server, allowing an actor to execute arbitrary commands on the server.
“Since the command was run with NT AUTHORITYSYSTEM privileges, exploiting this issue would allow an attacker to completely compromise the Netwrix server,” said Jordan Parkin of Bishop Fox.
Organizations that rely on Auditor are recommended to update the software to the latest version, 10.5, released June 6, to address any potential risk.