First published: Wed Aug 09 2023(Updated: )
A cross-site request forgery (CSRF) token bypass was identified in PRTG 23.2.84.1566 and earlier versions that allows remote attackers to perform actions with the permissions of a victim user, provided the victim user has an active session and is induced to trigger the malicious request. This could force PRTG to execute different actions, such as creating new users. The severity of this vulnerability is high and received a score of 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG Traffic Grapher | <23.3.86.1520 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-31452.
The severity of CVE-2023-31452 is high, with a score of 8.8.
The affected software is PRTG Network Monitor versions 23.2.84.1566 and earlier, up to exclusive version 23.3.86.1520.
A remote attacker can exploit CVE-2023-31452 by inducing a victim user, with an active session, to trigger a malicious request that bypasses the CSRF token.
Yes, multiple vulnerabilities including CVE-2023-31452 were fixed in version 23.3.86.1520 of PRTG Network Monitor. It is recommended to update to this version or later to address the issue.