|
|||
Rule General Information |
---|
Release Date: | 2021-01-28 | |
Rule Name: | PRTG Network Monitor Authenticated Remote Code Execution Vulnerability (CVE-2018-9276) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios. | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, Others | |
Reference: | ExploitDB:46527 http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html http://www.securityfocus.com/archive/1/542103/100/0/threaded |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://www.paessler.com/ |