Auditor Netwrix Auditor

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Netwrix Auditor.

Known Exploited Netwrix Auditor Vulnerabilities

The following Netwrix Auditor vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Netwrix Auditor Insecure Object Deserialization Vulnerability Netwrix Auditor User Activity Video Recording component contains an insecure objection deserialization vulnerability that allows an unauthenticated, remote attacker to execute code as the NT AUTHORITY\SYSTEM user. Successful exploitation requires that the attacker to be able to reach port 9004/TCP, which is commonly blocked by standard enterprise firewalling.
CVE-2022-31199 Exploit Probability: 5.9%
July 11, 2023

By the Year

In 2026 there have been 0 vulnerabilities in Netwrix Auditor. Auditor did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 1 9.80
2021 0 0.00
2020 0 0.00
2019 1 0.00

It may take a day or so for new Auditor vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Netwrix Auditor Security Vulnerabilities

Netwrix Auditor RCE via USER ACTIVITY VIDEO RECORDB protocol abuse
CVE-2022-31199 9.8 - Critical - November 08, 2022

Remote code execution vulnerabilities exist in the Netwrix Auditor User Activity Video Recording component affecting both the Netwrix Auditor server and agents installed on monitored systems. The remote code execution vulnerabilities exist within the underlying protocol used by the component, and potentially allow an unauthenticated remote attacker to execute arbitrary code as the NT AUTHORITY\SYSTEM user on affected systems, including on systems Netwrix Auditor monitors.

Marshaling, Unmarshaling

Netwrix Auditor before 9.8 has insecure permissions on %PROGRAMDATA%\Netwrix Auditor\Logs\ActiveDirectory\ and sub-folders
CVE-2019-14969 - August 12, 2019

Netwrix Auditor before 9.8 has insecure permissions on %PROGRAMDATA%\Netwrix Auditor\Logs\ActiveDirectory\ and sub-folders. In addition, the service Netwrix.ADA.StorageAuditService (which writes to that directory) does not perform proper impersonation, and thus the target file will have the same permissions as the invoking process (in this case, granting Authenticated Users full access over the target file). This vulnerability can be triggered by a low-privileged user to perform DLL Hijacking/Binary Planting attacks and ultimately execute code as NT AUTHORITY\SYSTEM with the help of Symbolic Links.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Netwrix Auditor or by Netwrix? Click the Watch button to subscribe.

Netwrix
Vendor

subscribe