LogonTracer authenticated command injection gives shell access
TL;DR - LogonTracer < 2.0.0: a logged-in user can run arbitrary OS commands on the server. If you run LogonTracer as a shared or internal service, treat any unpatched instance as potentially compromised and update to 2.0.0 immediately.
What happened
LogonTracer is a Windows event-log analysis tool used by defenders to investigate suspicious logon activity by visualising and correlating Windows event data.
CVE-2026-33277 is an OS command injection flaw (CWE-78). Any authenticated user can trigger arbitrary command execution on the host. That is the entire attack chain - credentials in, shell out.
| Item | Detail |
|---|---|
| Affected product | LogonTracer |
| Affected versions | prior to v2.0.0 |
| Patched version | v2.0.0 |
| CVSS v4.0 score | 8.7 (High) |
| CVSS v4.0 vector | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
| CVSS v3.0 score | 8.8 (High) |
| CVSS v3.0 vector | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
This is the worst kind of command injection: low-privilege access is all it takes. In any shared deployment - analyst teams, SOC tooling, internal security infrastructure - a single compromised account becomes a server-level foothold. And because LogonTracer hosts typically sit close to sensitive forensic data and domain-adjacent systems, the blast radius extends well beyond the tool itself.
Who is impacted
- Any deployment running
LogonTracerversionsprior to v2.0.0. - Highest risk: instances reachable over a network, or shared deployments where multiple users can authenticate - more accounts means more attack surface for credential compromise.
- Environments where the
LogonTracerhost has access to event-log archives, domain credentials, or adjacent internal services.
What to do now
- Update to
LogonTracer v2.0.0- the vendor-confirmed fix."Update the software to the latest version. The developer has released the following version to address these vulnerabilities: LogonTracer v2.0.0"
- Inventory every place
LogonTraceris running - VMs, containers, analyst workstations - and confirm nothing is on a version< 2.0.0. - Reduce exposure while you patch:
- restrict network access to the
LogonTracerUI and API using VPN or allowlists - disable or remove dormant user accounts
- restrict network access to the
- If you suspect compromise, treat the host as potentially owned:
- review authentication logs for unexpected or anomalous logins
- examine process execution telemetry on the
LogonTracerhost for suspicious child processes - rotate all credentials accessible from that host
Related
Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.
