A command injection was identified in PRTG 23.2.84.1566 and earlier versions in the Dicom C-ECHO sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The severity of this vulnerability is high and received a score of 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
References
Link | Resource |
---|---|
https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 | Vendor Advisory |
https://www.paessler.com/prtg/history/stable | Release Notes |
Configurations
History
No history.
Information
Published : 2023-08-09 12:15
Updated : 2023-08-16 12:15
NVD link : CVE-2023-32782
Mitre link : CVE-2023-32782
CVE.ORG link : CVE-2023-32782
JSON object : View
Products Affected
paessler
- prtg_network_monitor
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')