CVE-2021-47893

7.5 HIGH

📋 TL;DR

AgataSoft PingMaster Pro 2.1 contains a denial of service vulnerability in its Trace Route feature. Attackers can crash the application by overflowing the host name input field with a 10,000-character buffer, potentially causing system instability. This affects all users running the vulnerable version of PingMaster Pro.

💻 Affected Systems

Products:
  • AgataSoft PingMaster Pro
Versions: 2.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Trace Route feature specifically. Requires user interaction to paste malicious input.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application crash leading to system instability or unavailability of network monitoring functionality, potentially disrupting network operations.

🟠

Likely Case

Application crash requiring manual restart, temporary loss of network diagnostic capabilities.

🟢

If Mitigated

No impact if input validation is implemented or vulnerable version is not in use.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires physical or remote access to the application interface to paste malicious input into the host name field.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://agatasoft.com/

Restart Required: No

Instructions:

Check vendor website for updates. If no patch is available, implement workarounds or discontinue use of vulnerable version.

🔧 Temporary Workarounds

Disable Trace Route Feature

windows

Prevent use of the vulnerable Trace Route functionality

Input Validation via External Tool

all

Use network monitoring tools with proper input validation instead

🧯 If You Can't Patch

  • Restrict access to the application to trusted users only
  • Monitor for abnormal application crashes and investigate source

🔍 How to Verify

Check if Vulnerable:

Check if PingMaster Pro version 2.1 is installed. Attempt to paste 10,000+ characters into Trace Route host name field (test in isolated environment only).

Check Version:

Check Help > About in PingMaster Pro interface

Verify Fix Applied:

Verify application version is updated beyond 2.1 or test that long inputs in Trace Route no longer cause crashes.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs from PingMaster Pro
  • Windows Event Logs showing application failures

Network Indicators:

  • Unusual network traffic patterns if application is used for monitoring

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="PingMaster Pro"

🔗 References

📤 Share & Export