First published: Wed Nov 21 2018(Updated: )
Paessler PRTG Network Monitor contains a local file inclusion vulnerability that allows a remote, unauthenticated attacker to create users with read-write privileges (including administrator).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG | <18.2.40.1683 | |
Paessler PRTG |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for PRTG Network Monitor is CVE-2018-19410.
The severity of CVE-2018-19410 is critical with a score of 9.8.
CVE-2018-19410 allows remote unauthenticated attackers to create users with read-write privileges, including administrator access.
Yes, updating PRTG Network Monitor to version 18.2.40.1683 or newer will fix the vulnerability.
You can find more information about CVE-2018-19410 at the following link: [https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-24/](https://www.ptsecurity.com/ww-en/analytics/threatscape/pt-2018-24/)