INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global supply_chain Software Development and Technology CRITICAL 1h Global apt Multiple sectors / Critical Infrastructure CRITICAL 1h Global malware Financial Services CRITICAL 2h Global general Software/Technology LOW 2h Global malware Energy CRITICAL 2h Global spyware Software/Technology HIGH 2h Global malware Telecommunications and ISP HIGH 2h Global supply_chain Software Development and Supply Chain HIGH 3h Global vulnerability Software and Web Browsers HIGH 3h Global malware Energy and Utilities CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 1h Global apt Multiple sectors / Critical Infrastructure CRITICAL 1h Global malware Financial Services CRITICAL 2h Global general Software/Technology LOW 2h Global malware Energy CRITICAL 2h Global spyware Software/Technology HIGH 2h Global malware Telecommunications and ISP HIGH 2h Global supply_chain Software Development and Supply Chain HIGH 3h Global vulnerability Software and Web Browsers HIGH 3h Global malware Energy and Utilities CRITICAL 3h Global supply_chain Software Development and Technology CRITICAL 1h Global apt Multiple sectors / Critical Infrastructure CRITICAL 1h Global malware Financial Services CRITICAL 2h Global general Software/Technology LOW 2h Global malware Energy CRITICAL 2h Global spyware Software/Technology HIGH 2h Global malware Telecommunications and ISP HIGH 2h Global supply_chain Software Development and Supply Chain HIGH 3h Global vulnerability Software and Web Browsers HIGH 3h Global malware Energy and Utilities CRITICAL 3h
Vulnerabilities

CVE-2022-31199

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Netwrix Auditor Insecure Object Deserialization Vulnerability — Netwrix Auditor User Activity Video Recording component contains an insecure objection deserialization vulnerability that allows an unau
Published: Jul 11, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Netwrix Auditor Insecure Object Deserialization Vulnerability — Netwrix Auditor User Activity Video Recording component contains an insecure objection deserialization vulnerability that allows an unauthenticated, remote attacker to execute code as the NT AUTHORITY\SYSTEM user. Successful exploitation requires that the attacker is able to reach port 9004/TCP, which is commonly blocked by standard enterprise firewalling.

🤖 AI Executive Summary

CVE-2022-31199 is a critical remote code execution vulnerability in Netwrix Auditor's User Activity Video Recording component affecting versions prior to 9.5. An unauthenticated attacker can exploit insecure object deserialization on port 9004/TCP to execute arbitrary code with SYSTEM privileges. While port 9004 is typically firewalled in enterprise environments, exposed instances present severe risk. Public exploits are available, making immediate patching essential for all Saudi organizations using Netwrix Auditor.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 21:49
🇸🇦 Saudi Arabia Impact Assessment
Saudi government agencies (NCA, MISA), banking sector (SAMA-regulated institutions, major banks), healthcare organizations (MOH), and energy sector (ARAMCO, downstream companies) using Netwrix Auditor for compliance auditing and user activity monitoring face critical risk. Successful exploitation grants SYSTEM-level access enabling data exfiltration, lateral movement, and persistence. Government entities managing sensitive national security data and financial institutions handling customer data are particularly vulnerable. Telecom operators (STC, Mobily) using Netwrix for regulatory compliance also at risk.
🏢 Affected Saudi Sectors
Government (NCA, MISA, Ministry of Interior) Banking (SAMA-regulated institutions, major commercial banks) Healthcare (Ministry of Health, private hospitals) Energy (ARAMCO, downstream operators) Telecommunications (STC, Mobily, Zain) Financial Services Insurance
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Netwrix Auditor instances in your environment and verify installed versions
2. Check firewall rules to confirm port 9004/TCP is restricted to trusted networks only
3. Review access logs for port 9004 for any suspicious connection attempts
4. Isolate any exposed instances from untrusted networks immediately

PATCHING:
1. Upgrade Netwrix Auditor to version 9.5 or later immediately
2. Apply all available security patches from Netwrix
3. Test patches in non-production environment first
4. Schedule patching during maintenance windows with change management approval

COMPENSATING CONTROLS (if patching delayed):
1. Implement strict network segmentation - restrict port 9004/TCP access to authorized administrative networks only
2. Deploy WAF/IPS rules to detect and block deserialization payloads
3. Monitor port 9004 traffic for suspicious patterns
4. Implement application-level authentication controls
5. Enable detailed logging of all Netwrix Auditor activities

DETECTION:
1. Monitor for unexpected connections to port 9004/TCP from external sources
2. Alert on any process execution spawned by Netwrix Auditor service with SYSTEM privileges
3. Track modifications to Netwrix Auditor configuration files
4. Monitor for suspicious serialized object patterns in network traffic
5. Implement YARA rules for known exploit signatures
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع حالات Netwrix Auditor في بيئتك والتحقق من الإصدارات المثبتة
2. التحقق من قواعد جدار الحماية للتأكد من تقييد المنفذ 9004/TCP للشبكات الموثوقة فقط
3. مراجعة سجلات الوصول للمنفذ 9004 للتحقق من محاولات الاتصال المريبة
4. عزل أي حالات مكشوفة عن الشبكات غير الموثوقة فوراً

التصحيح:
1. ترقية Netwrix Auditor إلى الإصدار 9.5 أو أحدث فوراً
2. تطبيق جميع تصحيحات الأمان المتاحة من Netwrix
3. اختبار التصحيحات في بيئة غير الإنتاج أولاً
4. جدولة التصحيح خلال نوافذ الصيانة مع موافقة إدارة التغيير

الضوابط البديلة (إذا تأخر التصحيح):
1. تنفيذ تقسيم الشبكة الصارم - تقييد وصول المنفذ 9004/TCP للشبكات الإدارية المصرح بها فقط
2. نشر قواعد WAF/IPS للكشف عن حمولات فك التسلسل وحجبها
3. مراقبة حركة المنفذ 9004 للأنماط المريبة
4. تنفيذ ضوابط المصادقة على مستوى التطبيق
5. تفعيل التسجيل التفصيلي لجميع أنشطة Netwrix Auditor

الكشف:
1. مراقبة الاتصالات غير المتوقعة بالمنفذ 9004/TCP من مصادر خارجية
2. التنبيه على أي تنفيذ عملية من خدمة Netwrix Auditor بامتيازات SYSTEM
3. تتبع التعديلات على ملفات تكوين Netwrix Auditor
4. مراقبة الأنماط المريبة للكائنات المسلسلة في حركة الشبكة
5. تنفيذ قواعد YARA للتوقيعات المعروفة للاستغلال
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Secure development policy A.12.2.1 - Monitoring of system use A.12.4.1 - Event logging
🔵 SAMA CSF
ID.RA-1 - Asset management and vulnerability identification PR.IP-12 - Software development security DE.CM-1 - System monitoring and anomaly detection RS.MI-2 - Incident response and containment
🟡 ISO 27001:2022
A.12.2.1 - Monitoring of information systems A.12.6.1 - Management of technical vulnerabilities A.14.2.1 - Secure development and change management A.12.4.1 - Recording user activities
🟣 PCI DSS v4.0
6.2 - Security patches and updates 6.5.1 - Injection flaws prevention 10.2 - User activity logging 11.2 - Vulnerability scanning
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Netwrix:Auditor
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS5.85%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-08-01
Published 2023-07-11
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.