Executive Summary
During an internal security review, a critical vulnerability was identified in Netwrix Privilege Secure for Discovery, affecting versions 2.22.6 and earlier. This vulnerability may permit an attacker to gain unauthorized access to the system using default credentials which are not required to be changed during or after installation
While Netwrix is unaware of any current exploitation of this vulnerability, all Netwrix Privilege Secure for Discovery customers are advised to apply the available update immediately and ensure default passwords have been changed.
Vulnerability
Title | Affected Component | Affected Versions | CVSS 4.0 Score | CVSS 3.1 Score (Base / Temporal) | Description |
---|---|---|---|---|---|
Use of Default Credentials (CVE Pending) | Netwrix Privilege Secure for Discovery | <=2.22.6 | 9.5 | 10.0 / 9.3 | The product contains a default administrator password. There is no enforcement to ensure the password is changed during or after installation, which may allow an unauthorized attacker to gain administrative access to the system. |
Exploitability
Factors such as whether details about the vulnerability are publicly known, whether an exploit is readily available, or whether adversaries are actively exploiting the vulnerability are valuable in making risk-based judgments about urgency and priority; customers should use the information below in making those decisions.
Title | Publicly known? | Exploit available? | Actively exploited? |
---|---|---|---|
Use of Default Credentials | No | No | No |
Solution
All Netwrix Privilege Secure for Discovery customers are advised to apply the available update immediately. This update is essential to remediating risk from the described vulnerability.
The updated package is now available please contact support to schedule an upgrade window.
During the update process, customers will be required to set a new, secure password for the default administrator account. This ensures complete remediation of the vulnerability.
Please contact the Netwrix technical support team should you need assistance.
Official Fixes
Updated software has been released containing official fixes for the vulnerability as indicated in the table below.
Title | Version |
---|---|
Use of Default Credentials | 2.22.7 |
FAQ
-
Are all installations affected?
No, only those which have not changed the default password after installation are affected.
-
How do I determine which version of Netwrix Privilege Secure for Discovery is in use?
The version information can be found by running the
s1 version
command on the installed server.
Revisions
Updates to this advisory may be made as necessary. Information about each change will be published in the table below.
Revision | Date | Description |
---|---|---|
1 | 2025-08-28T12:00:00Z | First published |
Disclaimer
The information and materials included in or linked to this Security Advisory are provided on an “as-is” basis and without warranty of any kind, and we disclaim all representations and warranties of any kind, whether express or implied, including warranties of merchantability and fitness for a particular use. You acknowledge and agree that your use of the information and materials included in or linked to this Security Advisory are at your own risk.