Skip to content

Paessler patches PRTG zero-day vulnerability - 20240117005

Overview

Paessler has released updates to address a zero-day vulnerability in PRTG Network Monitor which could allow remote threat actors to bypass authentication on affected versions.

What is the Vulnerability?

CVE-2023-51630 - This vulnerability allows remote attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

What is Vulnerable?

Product(s) Affected Summary Severity CVSS
All versions of PRTG Network Monitor including 23.4.90.1299 and prior The specific flaw exists within the web console. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. TBA 8.8

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):

Additional References