Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36074: n/a

0
High
VulnerabilityCVE-2024-36074cvecve-2024-36074
Published: Thu Jun 27 2024 (06/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Netwrix CoSoSys Endpoint Protector through 5.9.3 and CoSoSys Unify through 7.0.6 contain a remote code execution vulnerability in the Endpoint Protector and Unify agent in the way that the EasyLock dependency is acquired from the server. An attacker with administrative access to the Endpoint Protector or Unify server can cause a client to acquire and execute a malicious file resulting in remote code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 05:00:20 UTC

Technical Analysis

CVE-2024-36074 is a remote code execution vulnerability found in Netwrix CoSoSys Endpoint Protector through version 5.9.3 and CoSoSys Unify through version 7.0.6. The vulnerability stems from the mechanism by which the client agents acquire the EasyLock dependency from the management server. Specifically, an attacker who has administrative access to the Endpoint Protector or Unify server can manipulate the server to deliver a malicious payload disguised as the EasyLock dependency. When the client agent downloads and executes this payload, it results in arbitrary code execution on the client machine. This flaw is categorized under CWE-94, indicating improper control over code generation or execution. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but demands high privileges on the server (PR:H) and no user interaction (UI:N). The vulnerability impacts confidentiality, integrity, and availability, as an attacker can execute arbitrary code remotely, potentially taking full control of affected endpoints. No patches or exploit code are currently publicly available, but the risk is elevated due to the nature of the vulnerability and the privileged access required to exploit it.

Potential Impact

The exploitation of CVE-2024-36074 can have severe consequences for organizations using Netwrix CoSoSys Endpoint Protector or CoSoSys Unify. An attacker with administrative access to the management server can execute arbitrary code on client endpoints, potentially leading to full system compromise. This can result in data breaches, unauthorized access to sensitive information, disruption of endpoint security controls, and lateral movement within the network. Since the vulnerability affects endpoint protection software, successful exploitation could undermine the security posture of an organization by disabling or manipulating security agents. The impact spans confidentiality, integrity, and availability, making it a critical concern for enterprises relying on these products for data loss prevention and endpoint security management.

Mitigation Recommendations

Organizations should immediately verify if they are running vulnerable versions of Netwrix CoSoSys Endpoint Protector (up to 5.9.3) or CoSoSys Unify (up to 7.0.6). Since no official patches are currently listed, administrators should restrict administrative access to the Endpoint Protector and Unify servers to trusted personnel only and enforce strong authentication and network segmentation to limit exposure. Monitoring and auditing server access logs for suspicious activity is critical. Additionally, organizations should consider implementing application allowlisting on client endpoints to prevent unauthorized execution of unexpected binaries. Network-level controls such as restricting client agent communication to only trusted servers and employing intrusion detection systems to flag anomalous payload deliveries can help mitigate risk. Once vendor patches or updates become available, prompt application is essential. Regular backups and incident response readiness will also help minimize damage if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5db7ef31ef0b5634eb

Added to database: 2/25/2026, 9:40:45 PM

Last enriched: 2/26/2026, 5:00:20 AM

Last updated: 4/12/2026, 4:22:07 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses