First published: Wed Aug 09 2023(Updated: )
A path traversal vulnerability was identified in the WMI Custom sensor in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the WMI Custom sensor into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG Traffic Grapher | <23.3.86.1520 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-31449.
The severity of CVE-2023-31449 is medium with a severity value of 4.7.
The vulnerability allows an authenticated user with write permissions to manipulate the behavior of the WMI Custom sensor, potentially leading to path traversal and unauthorized access to files or directories.
To fix the vulnerability, update to PRTG Network Monitor version 23.3.86.1520 or later, as the vulnerability has been fixed in this version.
You can find more information about CVE-2023-31449 in the Paessler Knowledge Base and the official Paessler PRTG Network Monitor release history.