Beyond Security Blog
laptop and network monitoring icons on blue gradient vector

March Networks Command Client before 2.7.2 Improper Control of Generation of Code


When Command Client initiates a connection to Command Enterprise Software or to a recorder (including the Command Recording Software), it downloads and executes some XAML objects used to render part of the interface, and provide disclaimers and terms of services. These XAML objects may be used as an attack vector, in affected versions of Command Client, to run malicious code in the system where the Command Client is used.


The information has been provided by Joachim Kerschbaumer

The original article can be found at


A rogue Command Enterprise Software or recorder (including the Command Recording Software) may inject malicious code in the downloaded XAML, or a man in the middle may intercept a valid one, replacing it.

Affected versions of Command Client execute the XAML, leading access to the system where the Command Client is used, exposing its file system and allowing malicious code execution. Said access is limited to the rights of the user that launched Command Client.

Vulnerable Systems:

March Networks Command Client before 2.7.2

CVE Information:


Disclosure Timeline:
Published Date:04/08/2020


SecuriTeam is a small group within Beyond Security dedicated to bringing you the latest news and utilities in computer security.

Please visit our central security portal at to keep up-to-date with the latest security research and read our archives containing over 10,000 articles about CVEs and zero-day exploits.

Contact Us
Want to learn more? Fill out the form below and we'll be in touch shortly.
By clicking Submit, I agree to the use of my personal data in accordance with the Beyond Security Privacy Policy. Beyond Security will not sell, trade, lease, or rent your personal data to third parties.
Vector image of purple colored handshake icon

Affected by Covid-19? Get free vulnerability scanning.

Before You go

Take a second to book a demo. Learn how to secure your networks & applications.

We'll be in touch!

We now have the ability to scan at any having sonar on our own network. We always know what is going on around us.”


Mike Gutknecht, Spectrum Brands