Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-36122: n/a in n/a

0
High
VulnerabilityCVE-2022-36122cvecve-2022-36122
Published: Fri Oct 21 2022 (10/21/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

The Automox Agent before 40 on Windows incorrectly sets permissions on key files.

AI-Powered Analysis

AILast updated: 07/05/2025, 06:39:44 UTC

Technical Analysis

CVE-2022-36122 is a high-severity vulnerability affecting the Automox Agent on Windows systems prior to version 40. The core issue involves improper permission settings on critical files used by the Automox Agent, which is a widely used endpoint management and patching tool. Specifically, the vulnerability is classified under CWE-732, which pertains to incorrect permissions on critical resources. This misconfiguration can allow an attacker with limited privileges (local access with low privileges) to escalate their rights by modifying or replacing key files that the Automox Agent relies upon. The CVSS v3.1 score of 7.8 reflects a high impact on confidentiality, integrity, and availability, with an attack vector limited to local access but requiring low privileges and no user interaction. The vulnerability does not require user interaction, and the scope remains unchanged, meaning the exploit affects only the vulnerable component without impacting other system components directly. Although no known exploits are currently reported in the wild, the potential for privilege escalation makes this a significant threat, especially in environments where the Automox Agent is deployed for automated patch management and endpoint security. The lack of a published patch link in the provided data suggests that remediation might require updating to version 40 or later, where the permissions issue has been corrected.

Potential Impact

For European organizations, this vulnerability poses a considerable risk, particularly for enterprises and managed service providers relying on Automox for endpoint management. Exploitation could allow attackers who have gained limited local access—such as through phishing, insider threats, or compromised user accounts—to escalate privileges and gain control over the affected systems. This could lead to unauthorized access to sensitive data, disruption of patch management processes, and potential lateral movement within corporate networks. Given the critical role of patch management in maintaining cybersecurity hygiene, exploitation could undermine the overall security posture, increasing the risk of further compromise from other threats. The impact is especially pronounced in sectors with stringent data protection requirements, such as finance, healthcare, and critical infrastructure, where confidentiality and integrity are paramount. Additionally, the vulnerability could be leveraged to disable or tamper with security controls, further exposing organizations to malware or ransomware attacks.

Mitigation Recommendations

European organizations should prioritize upgrading the Automox Agent to version 40 or later, where the permissions issue has been addressed. Until the update is applied, organizations should implement strict access controls on systems running the Automox Agent, limiting local user privileges and monitoring for unusual file modifications related to the agent's key files. Employing endpoint detection and response (EDR) solutions to detect privilege escalation attempts and anomalous behavior can provide early warning. Additionally, organizations should conduct regular audits of file permissions on critical system components and enforce the principle of least privilege for all users. Network segmentation can help contain potential compromises. Since no patch link is provided, coordination with Automox support or vendor advisories is recommended to obtain official patches or guidance. Finally, raising awareness among IT and security teams about this vulnerability and its exploitation vectors will help in timely detection and response.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-07-16T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8527

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 6:39:44 AM

Last updated: 2/7/2026, 4:16:58 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats