First published: Sat Apr 04 2020(Updated: )
PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG Traffic Grapher | <20.1.57.1745 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11547 is a vulnerability in PRTG Network Monitor that allows remote unauthenticated attackers to obtain information about probes running or the server itself.
Remote attackers can exploit CVE-2020-11547 by sending an HTTP request, allowing them to obtain information about probes running or the server itself.
CVE-2020-11547 has a severity rating of 5.3, which is considered medium.
To fix CVE-2020-11547, update your PRTG Network Monitor software to version 20.1.57.1745 or later.
Yes, you can find more information about CVE-2020-11547 at the following link: https://github.com/ch-rigu/PRTG-Network-Monitor-Information-Disclosure