An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.
Published 2018-07-02 16:29:01
Updated 2023-04-25 15:42:00
Source MITRE
View at NVD,   CVE.org

Products affected by CVE-2018-9276

Exploit prediction scoring system (EPSS) score for CVE-2018-9276

40.87%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2018-9276

  • PRTG Network Monitor Authenticated RCE
    Disclosure Date: 2018-06-25
    First seen: 2021-03-12
    exploit/windows/http/prtg_authenticated_rce
    Notifications can be created by an authenticated user and can execute scripts when triggered. Due to a poorly validated input on the script name, it is possible to chain it with a user-supplied command allowing command execution under the context of privileged user. Th

CVSS scores for CVE-2018-9276

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
9.0
HIGH AV:N/AC:L/Au:S/C:C/I:C/A:C
8.0
10.0
NIST
7.2
HIGH CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
1.2
5.9
NIST

CWE ids for CVE-2018-9276

References for CVE-2018-9276

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!