Advisory Details

December 30th, 2024

(0Day) Paessler PRTG Network Monitor SNMP Cross-Site Scripting Authentication Bypass Vulnerability

ZDI-24-1736
ZDI-CAN-23371

CVE ID CVE-2024-12833
CVSS SCORE 8.0, AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AFFECTED VENDORS Paessler
AFFECTED PRODUCTS PRTG Network Monitor
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. Some user interaction on the part of an administrator is required to exploit this vulnerability.

The specific flaw exists within the PRTG Network Monitor web interface. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system.

ADDITIONAL DETAILS

03/13/24 – ZDI reported the vulnerability to the vendor
11/19/24 - ZDI asked for updates
12/16/24 - ZDI notified the vendor of the intention to publish the case as 0-day advisory

Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the application


DISCLOSURE TIMELINE
  • 2024-03-13 - Vulnerability reported to vendor
  • 2024-12-30 - Coordinated public release of advisory
  • 2024-12-30 - Advisory Updated
CREDIT Andreas Finstad
BACK TO ADVISORIES