Data security company Netwrix recently patched a vulnerability in its Auditor product that could allow attackers to execute arbitrary code and possibly compromise an organization’s Active Directory domain.
The flaw in the IT auditing software was discovered by researchers at Bishop Fox. In an advisory published last week, the cybersecurity firm described it as a critical insecure object deserialization issue caused by an unsecured .NET remoting service.
“An attacker can use this issue to achieve arbitrary code execution on servers running Netwrix Auditor. Since this service is typically executed with extensive privileges in an Active Directory environment, the attacker would likely be able to compromise the Active Directory domain,” Bishop Fox explained.
The company has clarified for SecurityWeek that it’s unlikely an attacker could exploit the vulnerability from outside the targeted organization — access to the internal network is required to exploit the security hole.
On its website, Netwrix claims to have more than 11,500 customers worldwide, including major companies. Vulnerabilities in widely used products could be very useful to malicious actors.
Bishop Fox said the vendor was very responsive and communicative throughout the disclosure process.
A patch for the vulnerability is included in Netwrix Auditor version 10.5, released in early June. A CVE identifier is pending.