First published: Mon Mar 16 2020(Updated: )
A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG Traffic Grapher | <19.4.54.1506 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11073 is a Remote Code Execution vulnerability in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary.
CVE-2019-11073 has a severity rating of 7.2 out of 10, which is considered critical.
The Paessler PRTG Network Monitor version up to 19.4.54.1506 is affected by CVE-2019-11073.
CVE-2019-11073 can be exploited by remote authenticated administrators.
Yes, Paessler has released updates for PRTG Network Monitor to address CVE-2019-11073. It is recommended to update to version 19.4.54.1506 or later.