RULE(RULE ID:337868)

Rule General Information
Release Date: 2024-03-26
Rule Name: Paessler PRTG Network Monitor Arbitrary Command Execution Vulnerability (CVE-2023-32781)
Severity:
CVE ID:
Rule Protection Details
Description: A command injection vulnerability was identified in PRTG 23.2.84.1566 and earlier versions in the HL7 sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The severity of this vulnerability is high and received a score of 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Impact: An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Linux, Others
Reference: https://www.paessler.com/prtg/history/stable
https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520
https://cxsecurity.com/cveshow/CVE-2023-32781/
Solutions
Refer to the announcement or patch by the vendor: https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520