A command injection was identified in PRTG 23.2.84.1566 and earlier versions in the Dicom C-ECHO sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The severity of this vulnerability is high and received a score of 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
References
Link | Resource |
---|---|
https://kb.paessler.com/en/topic/91845-multiple-vulnerabilites-fixed-in-paessler-prtg-network-monitor-23-3-86-1520 | Vendor Advisory |
https://www.paessler.com/prtg/history/stable | Release Notes |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-08-09T00:00:00
Updated: 2023-08-16T00:00:00
Reserved: 2023-05-15T00:00:00
Link: CVE-2023-32782
JSON object: View
NVD Information
Status : Modified
Published: 2023-08-09T12:15:10.127
Modified: 2023-08-16T12:15:13.717
Link: CVE-2023-32782
JSON object: View
Redhat Information
No data.
CWE