-
Notifications
You must be signed in to change notification settings - Fork 35
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Paessler patches PRTG zero-day vulnerability - 20240117005 (#468)
* Updates to multiple advisories * Updated link * Laravel added to CISA Known Exploited Vulnerability Catalog - 20240117001 * Paessler patches PRTG zero-day vulnerability - 20240117005
- Loading branch information
1 parent
9645fb7
commit a0f5ae9
Showing
1 changed file
with
26 additions
and
0 deletions.
There are no files selected for viewing
26 changes: 26 additions & 0 deletions
26
docs/advisories/20240117005-Paessler-patches-PRTG-zero-day-vulnerability.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
# Paessler patches PRTG zero-day vulnerability - 20240117005 | ||
|
||
## Overview | ||
|
||
Paessler has released updates to address a zero-day vulnerability in PRTG Network Monitor which could allow remote threat actors to bypass authentication on affected versions. | ||
|
||
## What is the Vulnerability? | ||
|
||
[CVE-2023-51630](https://nvd.nist.gov/vuln/detail/CVE-2023-51630) - This vulnerability allows remote attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. | ||
|
||
## What is Vulnerable? | ||
|
||
| Product(s) Affected | Summary | Severity | CVSS | ||
| --- | --- |--- | --- | | ||
| All versions of PRTG Network Monitor ***including 23.4.90.1299 and prior*** | The specific flaw exists within the web console. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. | **TBA** | 8.8 | | ||
|
||
## Recommendation | ||
|
||
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month...* (refer [Patch Management](../guidelines/patch-management.md)): | ||
|
||
- It is highly recommended to update PRTG Network Monitor to ***version 24.1.90.1306 or later*** - [PRTG Network Monitor - Release Notes (paessler.com)](https://www.paessler.com/prtg/history/stable) | ||
|
||
|
||
## Additional References | ||
|
||
- [Paessler Security Advisory - ZDI-24-073 | Zero Day Initiative](https://www.zerodayinitiative.com/advisories/ZDI-24-073/) |