Unauthenticated OS Command Injection Vulnerability Affects Flowmon Versions
CVE-2024-2389

10CRITICAL

Key Information:

Status
Vendor
CVE Published:
2 April 2024

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 94%πŸ“° News Worthy

What is CVE-2024-2389?

Flowmon versions prior to 11.1.14 and 12.3.5 have been found to have an unauthenticated OS command injection vulnerability, allowing unauthorized users to execute arbitrary system commands. This vulnerability is rated extremely critical and has a CVSS score of 10.0, with the potential impact of allowing attackers to execute malicious code, read sensitive memory, or create a denial-of-service condition on affected devices. Progress Software has released updates for affected versions and is urging all users to update as quickly as possible. There are currently no known exploitations of this vulnerability by ransomware groups.

Affected Version(s)

Flowmon 11.X

Flowmon 11.X < 11.1.14

Flowmon 12.X < 12.3.5

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Vulnerability Recap 4/29/24: Cisco, Microsoft, Palo Alto & More

Catch up on the vulnerabilities, updates, and workarounds preceding the week of April 29, 2024, from Cisco, Microsoft, Palo Alto, and more.

Maximum severity Flowmon bug has a public exploit, patch now

Proof-of-concept exploit code has been released for a top-severity security vulnerability in Progress Flowmon, a tool for monitoring network performance and visibility.

PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389) - Help Net Security

A PoC exploit for an unauthenticated OS command injection vulnerability (CVE-2024-2389) in Progress Flowmon has been published.

References

EPSS Score

94% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by SecurityWeek

  • Vulnerability published

.