Paessler PRTG Network Monitor SNMP Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. Some user interaction on the part of an administrator is required to exploit this vulnerability.
The specific flaw exists within the PRTG Network Monitor web interface. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-23371.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-1736/ |
![]() ![]() |
History
Tue, 18 Feb 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Paessler
Paessler prtg Network Monitor |
|
CPEs | cpe:2.3:a:paessler:prtg_network_monitor:*:*:*:*:*:*:*:* | |
Vendors & Products |
Paessler
Paessler prtg Network Monitor |
|
Metrics |
cvssV3_1
|
Wed, 12 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 11 Feb 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Paessler PRTG Network Monitor SNMP Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. Some user interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the PRTG Network Monitor web interface. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-23371. | |
Title | Paessler PRTG Network Monitor SNMP Cross-Site Scripting Authentication Bypass Vulnerability | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2025-02-12T19:11:13.548Z
Reserved: 2024-12-19T22:20:57.912Z
Link: CVE-2024-12833

Updated: 2025-02-12T19:10:13.819Z

Status : Analyzed
Published: 2025-02-11T20:15:34.077
Modified: 2025-02-18T21:39:31.887
Link: CVE-2024-12833

No data.