Paessler PRTG Security Update – 16 January 2024

Paessler has released a security update to fix a vulnerability in PRTG Network Monitor 23.4.90.1299 and earlier versions.

The addressed vulnerability could allow the remote attacker to perform cross-site scripting attacks, inject arbitrary scripts, and bypass the authentication on the affected systems by persuading the PRTG user with an active session to visit a specially crafted website.

Paessler PRTG Network Monitor Cross-Site Scripting Authentication Bypass Vulnerability ( CVE-2023-51630):

  • CVSS: 8.8
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Consequences: Bypass Security
Vulnerabilities

CVE-2023-51630

Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

Paessler PRTG Security Update

References