CVE-2024-36075: n/a
CVE-2024-36075 is an arbitrary code execution vulnerability affecting CoSoSys Endpoint Protector through version 5. 9. 3 and Unify agent through 7. 0. 6. The flaw arises from insecure extraction of archives obtained from the Endpoint Protector or Unify server on the endpoint device. An attacker with the ability to modify the archive on the server can execute code remotely with administrator privileges on the endpoint. This vulnerability does not require user interaction but does require some level of privileges on the server to modify the archive. The CVSS score is 6. 5, indicating medium severity, with a high impact on integrity but no direct confidentiality or availability impact.
AI Analysis
Technical Summary
CVE-2024-36075 is a vulnerability identified in CoSoSys Endpoint Protector (up to version 5.9.3) and Unify agent (up to version 7.0.6) that allows arbitrary code execution on endpoint devices. The root cause is the insecure handling and extraction of archive files retrieved from the Endpoint Protector or Unify server. Specifically, if an attacker can modify the archive on the server, they can craft malicious payloads embedded within the archive that, when extracted on the endpoint, execute arbitrary code with administrator privileges. This vulnerability is categorized under CWE-94 (Improper Control of Generation of Code), indicating that the system improperly handles code generation or execution. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires privileges on the server (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The vulnerability primarily impacts the integrity of the system by allowing unauthorized code execution but does not directly affect confidentiality or availability. No patches or exploit code are currently publicly available, and no active exploitation has been reported. However, the potential for remote code execution with administrative privileges on endpoints makes this a significant risk for affected organizations.
Potential Impact
The primary impact of CVE-2024-36075 is the potential for remote code execution on endpoint devices with administrative privileges, which can lead to full system compromise. An attacker who can modify the archive on the server can execute arbitrary commands, potentially installing malware, stealing data, or disrupting endpoint operations. This undermines the integrity of the endpoint environment and could facilitate lateral movement within an organization’s network. Although confidentiality and availability impacts are not directly indicated, the ability to execute arbitrary code could be leveraged to escalate privileges, exfiltrate sensitive information, or disrupt endpoint functionality indirectly. Organizations relying on CoSoSys Endpoint Protector or Unify agents are at risk, especially if the attacker has access to the server environment or can intercept and modify the archive files. The medium CVSS score reflects the requirement for some level of privilege on the server and the absence of user interaction, but the administrative level code execution on endpoints elevates the threat considerably.
Mitigation Recommendations
1. Immediately verify and apply any available patches or updates from CoSoSys addressing this vulnerability once released. 2. Restrict and monitor access to the Endpoint Protector and Unify servers to prevent unauthorized modification of archive files. Implement strict access controls and audit logging on these servers. 3. Employ network segmentation to isolate management servers from general user networks, reducing the risk of attacker access. 4. Use file integrity monitoring on the server to detect unauthorized changes to archive files before they are distributed to endpoints. 5. Consider implementing endpoint application whitelisting to prevent execution of unauthorized code, even if malicious payloads are delivered. 6. Regularly review and harden server configurations to minimize privilege escalation opportunities. 7. Monitor endpoint and server logs for unusual activity indicative of exploitation attempts. 8. Educate administrators on the risks of this vulnerability and the importance of securing the server environment. 9. If patching is delayed, consider temporarily disabling automatic archive extraction or deploying compensating controls to validate archive integrity before extraction.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Switzerland, Japan, South Korea
CVE-2024-36075: n/a
Description
CVE-2024-36075 is an arbitrary code execution vulnerability affecting CoSoSys Endpoint Protector through version 5. 9. 3 and Unify agent through 7. 0. 6. The flaw arises from insecure extraction of archives obtained from the Endpoint Protector or Unify server on the endpoint device. An attacker with the ability to modify the archive on the server can execute code remotely with administrator privileges on the endpoint. This vulnerability does not require user interaction but does require some level of privileges on the server to modify the archive. The CVSS score is 6. 5, indicating medium severity, with a high impact on integrity but no direct confidentiality or availability impact.
AI-Powered Analysis
Technical Analysis
CVE-2024-36075 is a vulnerability identified in CoSoSys Endpoint Protector (up to version 5.9.3) and Unify agent (up to version 7.0.6) that allows arbitrary code execution on endpoint devices. The root cause is the insecure handling and extraction of archive files retrieved from the Endpoint Protector or Unify server. Specifically, if an attacker can modify the archive on the server, they can craft malicious payloads embedded within the archive that, when extracted on the endpoint, execute arbitrary code with administrator privileges. This vulnerability is categorized under CWE-94 (Improper Control of Generation of Code), indicating that the system improperly handles code generation or execution. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires privileges on the server (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The vulnerability primarily impacts the integrity of the system by allowing unauthorized code execution but does not directly affect confidentiality or availability. No patches or exploit code are currently publicly available, and no active exploitation has been reported. However, the potential for remote code execution with administrative privileges on endpoints makes this a significant risk for affected organizations.
Potential Impact
The primary impact of CVE-2024-36075 is the potential for remote code execution on endpoint devices with administrative privileges, which can lead to full system compromise. An attacker who can modify the archive on the server can execute arbitrary commands, potentially installing malware, stealing data, or disrupting endpoint operations. This undermines the integrity of the endpoint environment and could facilitate lateral movement within an organization’s network. Although confidentiality and availability impacts are not directly indicated, the ability to execute arbitrary code could be leveraged to escalate privileges, exfiltrate sensitive information, or disrupt endpoint functionality indirectly. Organizations relying on CoSoSys Endpoint Protector or Unify agents are at risk, especially if the attacker has access to the server environment or can intercept and modify the archive files. The medium CVSS score reflects the requirement for some level of privilege on the server and the absence of user interaction, but the administrative level code execution on endpoints elevates the threat considerably.
Mitigation Recommendations
1. Immediately verify and apply any available patches or updates from CoSoSys addressing this vulnerability once released. 2. Restrict and monitor access to the Endpoint Protector and Unify servers to prevent unauthorized modification of archive files. Implement strict access controls and audit logging on these servers. 3. Employ network segmentation to isolate management servers from general user networks, reducing the risk of attacker access. 4. Use file integrity monitoring on the server to detect unauthorized changes to archive files before they are distributed to endpoints. 5. Consider implementing endpoint application whitelisting to prevent execution of unauthorized code, even if malicious payloads are delivered. 6. Regularly review and harden server configurations to minimize privilege escalation opportunities. 7. Monitor endpoint and server logs for unusual activity indicative of exploitation attempts. 8. Educate administrators on the risks of this vulnerability and the importance of securing the server environment. 9. If patching is delayed, consider temporarily disabling automatic archive extraction or deploying compensating controls to validate archive integrity before extraction.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c5db7ef31ef0b5634ee
Added to database: 2/25/2026, 9:40:45 PM
Last enriched: 2/26/2026, 5:00:34 AM
Last updated: 2/26/2026, 6:11:32 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.