CVE-2024-36075: n/a
The CoSoSys Endpoint Protector through 5.9.3 and Unify agent through 7.0.6 is susceptible to an arbitrary code execution vulnerability due to the way an archive obtained from the Endpoint Protector or Unify server is extracted on the endpoint. An attacker who is able to modify the archive on the server could obtain remote code execution as an administrator on an endpoint.
AI Analysis
Technical Summary
CVE-2024-36075 is a vulnerability identified in CoSoSys Endpoint Protector (up to version 5.9.3) and Unify agent (up to version 7.0.6) that allows arbitrary code execution on endpoint devices. The root cause is the insecure handling and extraction of archive files retrieved from the Endpoint Protector or Unify server. Specifically, if an attacker can modify the archive on the server, they can craft malicious payloads embedded within the archive that, when extracted on the endpoint, execute arbitrary code with administrator privileges. This vulnerability is categorized under CWE-94 (Improper Control of Generation of Code), indicating that the system improperly handles code generation or execution. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires privileges on the server (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The vulnerability primarily impacts the integrity of the system by allowing unauthorized code execution but does not directly affect confidentiality or availability. No patches or exploit code are currently publicly available, and no active exploitation has been reported. However, the potential for remote code execution with administrative privileges on endpoints makes this a significant risk for affected organizations.
Potential Impact
The primary impact of CVE-2024-36075 is the potential for remote code execution on endpoint devices with administrative privileges, which can lead to full system compromise. An attacker who can modify the archive on the server can execute arbitrary commands, potentially installing malware, stealing data, or disrupting endpoint operations. This undermines the integrity of the endpoint environment and could facilitate lateral movement within an organization’s network. Although confidentiality and availability impacts are not directly indicated, the ability to execute arbitrary code could be leveraged to escalate privileges, exfiltrate sensitive information, or disrupt endpoint functionality indirectly. Organizations relying on CoSoSys Endpoint Protector or Unify agents are at risk, especially if the attacker has access to the server environment or can intercept and modify the archive files. The medium CVSS score reflects the requirement for some level of privilege on the server and the absence of user interaction, but the administrative level code execution on endpoints elevates the threat considerably.
Mitigation Recommendations
1. Immediately verify and apply any available patches or updates from CoSoSys addressing this vulnerability once released. 2. Restrict and monitor access to the Endpoint Protector and Unify servers to prevent unauthorized modification of archive files. Implement strict access controls and audit logging on these servers. 3. Employ network segmentation to isolate management servers from general user networks, reducing the risk of attacker access. 4. Use file integrity monitoring on the server to detect unauthorized changes to archive files before they are distributed to endpoints. 5. Consider implementing endpoint application whitelisting to prevent execution of unauthorized code, even if malicious payloads are delivered. 6. Regularly review and harden server configurations to minimize privilege escalation opportunities. 7. Monitor endpoint and server logs for unusual activity indicative of exploitation attempts. 8. Educate administrators on the risks of this vulnerability and the importance of securing the server environment. 9. If patching is delayed, consider temporarily disabling automatic archive extraction or deploying compensating controls to validate archive integrity before extraction.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, Switzerland, Japan, South Korea
CVE-2024-36075: n/a
Description
The CoSoSys Endpoint Protector through 5.9.3 and Unify agent through 7.0.6 is susceptible to an arbitrary code execution vulnerability due to the way an archive obtained from the Endpoint Protector or Unify server is extracted on the endpoint. An attacker who is able to modify the archive on the server could obtain remote code execution as an administrator on an endpoint.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-36075 is a vulnerability identified in CoSoSys Endpoint Protector (up to version 5.9.3) and Unify agent (up to version 7.0.6) that allows arbitrary code execution on endpoint devices. The root cause is the insecure handling and extraction of archive files retrieved from the Endpoint Protector or Unify server. Specifically, if an attacker can modify the archive on the server, they can craft malicious payloads embedded within the archive that, when extracted on the endpoint, execute arbitrary code with administrator privileges. This vulnerability is categorized under CWE-94 (Improper Control of Generation of Code), indicating that the system improperly handles code generation or execution. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires privileges on the server (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The vulnerability primarily impacts the integrity of the system by allowing unauthorized code execution but does not directly affect confidentiality or availability. No patches or exploit code are currently publicly available, and no active exploitation has been reported. However, the potential for remote code execution with administrative privileges on endpoints makes this a significant risk for affected organizations.
Potential Impact
The primary impact of CVE-2024-36075 is the potential for remote code execution on endpoint devices with administrative privileges, which can lead to full system compromise. An attacker who can modify the archive on the server can execute arbitrary commands, potentially installing malware, stealing data, or disrupting endpoint operations. This undermines the integrity of the endpoint environment and could facilitate lateral movement within an organization’s network. Although confidentiality and availability impacts are not directly indicated, the ability to execute arbitrary code could be leveraged to escalate privileges, exfiltrate sensitive information, or disrupt endpoint functionality indirectly. Organizations relying on CoSoSys Endpoint Protector or Unify agents are at risk, especially if the attacker has access to the server environment or can intercept and modify the archive files. The medium CVSS score reflects the requirement for some level of privilege on the server and the absence of user interaction, but the administrative level code execution on endpoints elevates the threat considerably.
Mitigation Recommendations
1. Immediately verify and apply any available patches or updates from CoSoSys addressing this vulnerability once released. 2. Restrict and monitor access to the Endpoint Protector and Unify servers to prevent unauthorized modification of archive files. Implement strict access controls and audit logging on these servers. 3. Employ network segmentation to isolate management servers from general user networks, reducing the risk of attacker access. 4. Use file integrity monitoring on the server to detect unauthorized changes to archive files before they are distributed to endpoints. 5. Consider implementing endpoint application whitelisting to prevent execution of unauthorized code, even if malicious payloads are delivered. 6. Regularly review and harden server configurations to minimize privilege escalation opportunities. 7. Monitor endpoint and server logs for unusual activity indicative of exploitation attempts. 8. Educate administrators on the risks of this vulnerability and the importance of securing the server environment. 9. If patching is delayed, consider temporarily disabling automatic archive extraction or deploying compensating controls to validate archive integrity before extraction.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c5db7ef31ef0b5634ee
Added to database: 2/25/2026, 9:40:45 PM
Last enriched: 2/26/2026, 5:00:34 AM
Last updated: 4/12/2026, 7:51:43 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.