First published: Wed Aug 09 2023(Updated: )
A command injection was identified in PRTG 23.2.84.1566 and earlier versions in the Dicom C-ECHO sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The severity of this vulnerability is high and received a score of 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Paessler PRTG Traffic Grapher | <23.3.86.1520 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this command injection is CVE-2023-32782.
The affected software for this vulnerability is Paessler PRTG Network Monitor version up to 23.3.86.1520.
The severity of CVE-2023-32782 is high with a CVSS score of 7.2.
An attacker with write permissions and authenticated access can abuse the debug option in the Dicom C-ECHO sensor to write new files that could potentially execute malicious code.
Yes, a fix is available in Paessler PRTG Network Monitor version 23.3.86.1520 and later.