Description
Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.
Exploits (1)
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://bishopfox.com/blog/netwrix-auditor-advisory
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-31199
Scores
CVSS v3
9.8
EPSS
0.0585
EPSS Percentile
90.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
active
Automatable
no
Technical Impact
total
Lab Environment
Details
CISA KEV
2023-07-11
VulnCheck KEV
2022-12-08
InTheWild.io
2022-12-08
ENISA EUVD
EUVD-2022-53293
Ransomware Use
Confirmed
CWE
CWE-502
Status
published
Products (1)
netwrix/auditor
< 10.5
Published
Nov 08, 2022
KEV Added
Jul 11, 2023
Tracked Since
Feb 18, 2026