Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36074: n/a

0
High
VulnerabilityCVE-2024-36074cvecve-2024-36074
Published: Thu Jun 27 2024 (06/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-36074 is a high-severity remote code execution vulnerability affecting Netwrix CoSoSys Endpoint Protector (up to version 5. 9. 3) and CoSoSys Unify (up to version 7. 0. 6). The flaw arises from the way the EasyLock dependency is retrieved by the client agents from the server. An attacker with administrative privileges on the Endpoint Protector or Unify server can exploit this vulnerability to cause clients to download and execute malicious files, leading to full remote code execution without user interaction. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code). Although no public exploits are currently known, the CVSS score of 7. 2 indicates a significant risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:00:20 UTC

Technical Analysis

CVE-2024-36074 is a remote code execution vulnerability found in Netwrix CoSoSys Endpoint Protector through version 5.9.3 and CoSoSys Unify through version 7.0.6. The vulnerability stems from the mechanism by which the client agents acquire the EasyLock dependency from the management server. Specifically, an attacker who has administrative access to the Endpoint Protector or Unify server can manipulate the server to deliver a malicious payload disguised as the EasyLock dependency. When the client agent downloads and executes this payload, it results in arbitrary code execution on the client machine. This flaw is categorized under CWE-94, indicating improper control over code generation or execution. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but demands high privileges on the server (PR:H) and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability, as an attacker can execute arbitrary code remotely, potentially taking full control of affected endpoints. No patches or exploit code are currently publicly available, but the risk is elevated due to the nature of the vulnerability and the privileged access required to exploit it.

Potential Impact

The exploitation of CVE-2024-36074 can have severe consequences for organizations using Netwrix CoSoSys Endpoint Protector or CoSoSys Unify. An attacker with administrative access to the management server can execute arbitrary code on client endpoints, potentially leading to full system compromise. This can result in data breaches, unauthorized access to sensitive information, disruption of endpoint security controls, and lateral movement within the network. Since the vulnerability affects endpoint protection software, successful exploitation could undermine the security posture of an organization by disabling or manipulating security agents. The impact spans confidentiality, integrity, and availability, making it a critical concern for enterprises relying on these products for data loss prevention and endpoint security management.

Mitigation Recommendations

Organizations should immediately verify if they are running vulnerable versions of Netwrix CoSoSys Endpoint Protector (up to 5.9.3) or CoSoSys Unify (up to 7.0.6). Since no official patches are currently listed, administrators should restrict administrative access to the Endpoint Protector and Unify servers to trusted personnel only and enforce strong authentication and network segmentation to limit exposure. Monitoring and auditing server access logs for suspicious activity is critical. Additionally, organizations should consider implementing application allowlisting on client endpoints to prevent unauthorized execution of unexpected binaries. Network-level controls such as restricting client agent communication to only trusted servers and employing intrusion detection systems to flag anomalous payload deliveries can help mitigate risk. Once vendor patches or updates become available, prompt application is essential. Regular backups and incident response readiness will also help minimize damage if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5db7ef31ef0b5634eb

Added to database: 2/25/2026, 9:40:45 PM

Last enriched: 2/26/2026, 5:00:20 AM

Last updated: 2/26/2026, 9:35:59 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats