Netwrix reports vulnerability in Netwrix Account Lockout Examiner 4.1
Netwrix, a cybersecurity vendor that makes data security easy, today announced the discovery of a zero-day vulnerability in Netwrix Account Lockout Examiner freeware. All users of Netwrix Account Lockout Examiner 4.1 or earlier should consider immediately upgrading to version 5.1 or higher in order to avoid falling victim to this vulnerability.
According to research by Optiv, an attacker can force an account used to run Account Lockout Examiner to authenticate to a system that the attacker controls, enabling them to capture the associated NTLMv1/v2 challenge-response and gain the Domain Admin credentials used to run Account Lockout Examiner. For more details about this possible attack scenario, read the full Optiv article.
This vulnerability was discovered by Optiv security consultants Robert Surace and Daniel Min while performing a security assessment of Netwrix Lockout Examiner, and Optiv reported it to Netwrix.
For more information about mitigating the vulnerability, please visit the FAQ page: https://www.netwrix.com/faq_ale_vulnerability.html
To download Account Lockout Examiner 5.1 for free, please visit: https://www.netwrix.com/account_lockout_examiner.html
Netwrix makes data security easy. Since 2006, Netwrix solutions have been simplifying the lives of security professionals by enabling them to identify and protect sensitive data to reduce the risk of a breach, and to detect, respond to and recover from attacks, limiting their impact. More than 13,500 organizations worldwide rely on Netwrix solutions to strengthen their security and compliance posture across all three primary attack vectors: data, identity and infrastructure.
For more information, visit www.netwrix.com.
Your questions and feedback are always welcome. Please dial our toll-free number: 888 - 638 - 9749, or enter your question details here and we will reply as soon as possible.
Erin Jones, Avista PR for Netwrix
Phone: 704 - 664 - 2170