ADV-2024-004 - Remote Code Execution in Unify Management Console (CVE-2024-44066)

Executive Summary

A vulnerability was discovered in CoSoSys Unify which could allow an attacker with administrator access to the Unify Management Console to remotely execute arbitrary code on the server with root privileges.

Netwrix is unaware of any evidence of active exploitation of this vulnerability.

Vulnerability

Title Affected Component Affected Versions CVSS 4.0 Score CVSS 3.1 Score (Base / Temporal) Description
Remote code execution in Unify Management Console (CVE-2024-44066) CoSoSys Unify <= 7.1.0 9.4 9.1 / 7.9 A vulnerability in the CoSoSys Unify Management Console could allow an attacker with administrator access to remotely execute arbitrary code on the server with root privileges.

Exploitability

Factors such as whether details about the vulnerability are publicly known, whether an exploit is readily available, or whether adversaries are actively exploiting the vulnerability are valuable in making risk-based judgements about urgency and priority; customers should use the information below in making those decisions.

Title Publicly known? Exploit available? Actively exploited?
Remote code execution in Unify Management Console (CVE-2024-44066) No No No

Solution

CoSoSys Unify customers are advised to take the following actions:

  1. Download the relevant security hotfix for your Unify installation:

    Product Applicable Version Downloads
    CoSoSys Unify 7.0.6.2 Download offline patch
    CoSoSys Unify 7.1.2 Download offline patch
  2. Apply the security hotfix via the Offline Patch feature.

Official Fixes

Updated software has been released containing official fixes as indicated in the table below.

Product Current Version Hotfix Version
CoSoSys Unify 7.0.6.2 7.0.6.2 Hotfix #1.2
CoSoSys Unify 7.1.0 7.1.0 Hotfix #1.2

FAQ

  1. How do I determine the version of CoSoSys Endpoint Protector and whether the patch is applied?

    Please refer to this knowledge base article.

Revisions

Updates to this advisory may be made as necessary. Information about each change will be published in the table below.

Revision Date Description
1 2024-09-17T12:00:00Z First published

Disclaimer

The information and materials included in or linked to this Security Advisory are provided on an “as-is” basis and without warranty of any kind, and we disclaim all representations and warranties of any kind, whether express or implied, including warranties of merchantability and fitness for a particular use. You acknowledge and agree that your use of the information and materials included in or linked to this Security Advisory are at your own risk.