Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36073: n/a

0
High
VulnerabilityCVE-2024-36073cvecve-2024-36073
Published: Thu Jun 27 2024 (06/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-36073 is a high-severity remote code execution vulnerability affecting Netwrix CoSoSys Endpoint Protector (up to version 5. 9. 3) and CoSoSys Unify (up to version 7. 0. 6). The flaw exists in the shadowing component of the Endpoint Protector and Unify agents, allowing an attacker with administrative access to the server to overwrite sensitive configurations and execute system commands with SYSTEM or root privileges on targeted client endpoints. Exploitation requires administrative privileges on the management server but no user interaction. The vulnerability impacts confidentiality, integrity, and availability of affected systems. No known exploits are currently reported in the wild. Organizations using these products should prioritize patching or mitigating this vulnerability to prevent potential lateral movement and full endpoint compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:00:06 UTC

Technical Analysis

CVE-2024-36073 is a remote code execution vulnerability identified in the shadowing component of Netwrix CoSoSys Endpoint Protector (versions through 5.9.3) and CoSoSys Unify (versions through 7.0.6). The shadowing component is responsible for mirroring or managing endpoint configurations. An attacker who has already obtained administrative access to the Endpoint Protector or Unify server can exploit this vulnerability to overwrite sensitive configuration files. This manipulation enables the attacker to execute arbitrary system commands with SYSTEM (Windows) or root (Linux/macOS) privileges on a chosen client endpoint managed by these solutions. The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating command injection risks. The CVSS v3.1 base score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required privileges (high), no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are reported yet, the potential for attackers to leverage administrative access to gain full control over endpoints is significant. This vulnerability highlights the risk of trust relationships between management servers and endpoints in enterprise data loss prevention and device control solutions.

Potential Impact

The vulnerability allows attackers with administrative access to the management server to execute arbitrary commands with the highest privileges on client endpoints. This can lead to full compromise of endpoint devices, including data theft, installation of persistent malware, lateral movement within the network, and disruption of endpoint operations. Confidentiality is severely impacted as sensitive data on endpoints can be accessed or exfiltrated. Integrity is compromised because attackers can alter system configurations and files. Availability can be affected if attackers deploy destructive payloads or disrupt endpoint functionality. Organizations relying on Endpoint Protector or CoSoSys Unify for data loss prevention and device control face increased risk of insider threats or attackers who have breached administrative credentials. The scope includes all client endpoints managed by vulnerable versions of these products, potentially spanning large enterprise environments.

Mitigation Recommendations

1. Immediately upgrade Netwrix CoSoSys Endpoint Protector to a version later than 5.9.3 and CoSoSys Unify to a version later than 7.0.6 once patches are released by the vendor. 2. Until patches are available, restrict administrative access to the Endpoint Protector and Unify servers to trusted personnel only and enforce strong multi-factor authentication to reduce risk of credential compromise. 3. Monitor and audit administrative actions on these servers for unusual configuration changes or command executions. 4. Implement network segmentation to limit access between management servers and client endpoints, reducing the attack surface. 5. Employ endpoint detection and response (EDR) solutions on client devices to detect anomalous command execution or privilege escalation attempts. 6. Review and harden configurations of the shadowing component if possible, disabling unnecessary features or services. 7. Conduct regular security assessments and penetration tests focusing on management infrastructure to identify and remediate privilege escalation paths. 8. Educate administrators on the risks of credential compromise and enforce least privilege principles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5db7ef31ef0b5634e8

Added to database: 2/25/2026, 9:40:45 PM

Last enriched: 2/26/2026, 5:00:06 AM

Last updated: 2/26/2026, 8:02:38 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats