CVE-2024-12833

6.1 MEDIUM

📋 TL;DR

This vulnerability in Paessler PRTG Network Monitor allows network-adjacent attackers to bypass authentication through a cross-site scripting (XSS) flaw in the SNMP configuration interface. Attackers can inject malicious scripts that execute when an administrator views certain pages, potentially gaining unauthorized access. Organizations running vulnerable PRTG installations with SNMP monitoring enabled are affected.

💻 Affected Systems

Products:
  • Paessler PRTG Network Monitor
Versions: Versions prior to 24.1.93.152
Operating Systems: Windows, Linux (via Windows compatibility layer)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SNMP monitoring to be configured and administrators to interact with affected web interface pages.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise where attackers gain administrative access, modify configurations, exfiltrate sensitive network data, or deploy ransomware.

🟠

Likely Case

Unauthorized access to monitoring data, configuration changes to monitoring rules, or privilege escalation within the PRTG system.

🟢

If Mitigated

Limited impact with proper network segmentation, web application firewalls, and administrator awareness training preventing successful exploitation.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires network adjacency, internet-facing PRTG instances could be targeted through VPN or compromised internal systems.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this without external network access, making lateral movement easier.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network adjacency and administrator interaction with specific web interface elements. The ZDI advisory suggests exploitation is feasible but not trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.1.93.152

Vendor Advisory: https://kb.paessler.com/en/topic/109956-security-advisory-prtg-network-monitor-vulnerability-cve-2024-12833

Restart Required: Yes

Instructions:

1. Backup PRTG configuration. 2. Download and install PRTG version 24.1.93.152 or later from Paessler website. 3. Restart PRTG services. 4. Verify installation and monitor for issues.

🔧 Temporary Workarounds

Disable SNMP Monitoring

all

Temporarily disable SNMP sensors and monitoring if not critical for operations

Navigate to PRTG web interface > Devices > Select device > Sensors > Disable SNMP sensors

Network Segmentation

all

Restrict access to PRTG web interface to trusted administrative networks only

Configure firewall rules to limit PRTG web interface access to specific IP ranges

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PRTG from untrusted networks
  • Deploy web application firewall with XSS protection rules and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check PRTG version in web interface: Help > About PRTG Network Monitor. If version is below 24.1.93.152, system is vulnerable.

Check Version:

In PRTG web interface, navigate to Help > About PRTG Network Monitor

Verify Fix Applied:

Verify version shows 24.1.93.152 or higher in Help > About, then test SNMP configuration pages for any script injection attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication events
  • Administrative actions from unexpected IP addresses
  • JavaScript errors in web server logs related to SNMP pages

Network Indicators:

  • Unexpected HTTP requests to SNMP configuration endpoints
  • Suspicious script tags in POST data to PRTG web interface

SIEM Query:

source="PRTG" AND (event_type="authentication" AND result="success" FROM unexpected_ip) OR (url_path="*snmp*" AND post_data CONTAINS "<script>")

🔗 References

📤 Share & Export