Virtual Event Today: Supply Chain Security Summit - Join Event In-Progress

Security Experts:

Connect with us

Hi, what are you looking for?



Netwrix Auditor Vulnerability Can Facilitate Attacks on Enterprises

Data security company Netwrix recently patched a vulnerability in its Auditor product that could allow attackers to execute arbitrary code and possibly compromise an organization’s Active Directory domain.

Data security company Netwrix recently patched a vulnerability in its Auditor product that could allow attackers to execute arbitrary code and possibly compromise an organization’s Active Directory domain.

The flaw in the IT auditing software was discovered by researchers at Bishop Fox. In an advisory published last week, the cybersecurity firm described it as a critical insecure object deserialization issue caused by an unsecured .NET remoting service.

“An attacker can use this issue to achieve arbitrary code execution on servers running Netwrix Auditor. Since this service is typically executed with extensive privileges in an Active Directory environment, the attacker would likely be able to compromise the Active Directory domain,” Bishop Fox explained.

The company has clarified for SecurityWeek that it’s unlikely an attacker could exploit the vulnerability from outside the targeted organization — access to the internal network is required to exploit the security hole.

On its website, Netwrix claims to have more than 11,500 customers worldwide, including major companies. Vulnerabilities in widely used products could be very useful to malicious actors.

Bishop Fox said the vendor was very responsive and communicative throughout the disclosure process.

A patch for the vulnerability is included in Netwrix Auditor version 10.5, released in early June. A CVE identifier is pending.

Related: Critical Code Execution Vulnerability Patched in Splunk Enterprise

Related: Critical Account Takeover Vulnerability Patched in GitLab Enterprise Edition

Related: High-Severity Vulnerabilities Patched in McAfee Enterprise Product

Related: Vulnerabilities in Aruba and Avaya Switches Expose Enterprise Networks to Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.


GoAnywhere MFT users warned about a zero-day remote code injection exploit that can be targeted directly from the internet