CVE ID | CVE-2024-12833 |
CVSS SCORE | 8.0, AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
AFFECTED VENDORS |
Paessler |
AFFECTED PRODUCTS |
PRTG Network Monitor |
VULNERABILITY DETAILS |
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. Some user interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the PRTG Network Monitor web interface. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. |
ADDITIONAL DETAILS |
03/13/24 – ZDI reported the vulnerability to the vendor Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application |
DISCLOSURE TIMELINE |
|
CREDIT | Andreas Finstad |