Skip to main content

CVE-2022-36122: n/a in n/a

High
VulnerabilityCVE-2022-36122cvecve-2022-36122
Published: Fri Oct 21 2022 (10/21/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The Automox Agent before 40 on Windows incorrectly sets permissions on key files.

AI-Powered Analysis

AILast updated: 07/05/2025, 06:39:44 UTC

Technical Analysis

CVE-2022-36122 is a high-severity vulnerability affecting the Automox Agent on Windows systems prior to version 40. The core issue involves improper permission settings on critical files used by the Automox Agent, which is a widely used endpoint management and patching tool. Specifically, the vulnerability is classified under CWE-732, which pertains to incorrect permissions on critical resources. This misconfiguration can allow an attacker with limited privileges (local access with low privileges) to escalate their rights by modifying or replacing key files that the Automox Agent relies upon. The CVSS v3.1 score of 7.8 reflects a high impact on confidentiality, integrity, and availability, with an attack vector limited to local access but requiring low privileges and no user interaction. The vulnerability does not require user interaction, and the scope remains unchanged, meaning the exploit affects only the vulnerable component without impacting other system components directly. Although no known exploits are currently reported in the wild, the potential for privilege escalation makes this a significant threat, especially in environments where the Automox Agent is deployed for automated patch management and endpoint security. The lack of a published patch link in the provided data suggests that remediation might require updating to version 40 or later, where the permissions issue has been corrected.

Potential Impact

For European organizations, this vulnerability poses a considerable risk, particularly for enterprises and managed service providers relying on Automox for endpoint management. Exploitation could allow attackers who have gained limited local access—such as through phishing, insider threats, or compromised user accounts—to escalate privileges and gain control over the affected systems. This could lead to unauthorized access to sensitive data, disruption of patch management processes, and potential lateral movement within corporate networks. Given the critical role of patch management in maintaining cybersecurity hygiene, exploitation could undermine the overall security posture, increasing the risk of further compromise from other threats. The impact is especially pronounced in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, where confidentiality and integrity are paramount. Additionally, the vulnerability could be leveraged to disable or tamper with security controls, further exposing organizations to malware or ransomware attacks.

Mitigation Recommendations

European organizations should prioritize upgrading the Automox Agent to version 40 or later, where the permissions issue has been addressed. Until the update is applied, organizations should implement strict access controls on systems running the Automox Agent, limiting local user privileges and monitoring for unusual file modifications related to the agent's key files. Employing endpoint detection and response (EDR) solutions to detect privilege escalation attempts and anomalous behavior can provide early warning. Additionally, organizations should conduct regular audits of file permissions on critical system components and enforce the principle of least privilege for all users. Network segmentation can help contain potential compromises. Since no patch link is provided, coordination with Automox support or vendor advisories is recommended to obtain official patches or guidance. Finally, raising awareness among IT and security teams about this vulnerability and its exploitation vectors will help in timely detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-16T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8527

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 6:39:44 AM

Last updated: 8/5/2025, 2:54:12 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats