A command injection was identified in PRTG 23.2.84.1566 and earlier versions in the Dicom C-ECHO sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The severity of this vulnerability is high and received a score of 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
References
Configurations
History
21 Nov 2024, 08:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 - Vendor Advisory | |
References | () https://www.paessler.com/prtg/history/stable - Release Notes | |
Summary |
|
Information
Published : 2023-08-09 12:15
Updated : 2024-11-21 08:04
NVD link : CVE-2023-32782
Mitre link : CVE-2023-32782
CVE.ORG link : CVE-2023-32782
JSON object : View
Products Affected
paessler
- prtg_network_monitor
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')