Unauthenticated OS Command Injection Vulnerability Affects Flowmon Versions
CVE-2024-2389
Key Information:
- Vendor
Progress Software
- Status
- Vendor
- CVE Published:
- 2 April 2024
Badges
What is CVE-2024-2389?
Flowmon versions prior to 11.1.14 and 12.3.5 have been found to have an unauthenticated OS command injection vulnerability, allowing unauthorized users to execute arbitrary system commands. This vulnerability is rated extremely critical and has a CVSS score of 10.0, with the potential impact of allowing attackers to execute malicious code, read sensitive memory, or create a denial-of-service condition on affected devices. Progress Software has released updates for affected versions and is urging all users to update as quickly as possible. There are currently no known exploitations of this vulnerability by ransomware groups.
Affected Version(s)
Flowmon 11.X
Flowmon 11.X < 11.1.14
Flowmon 12.X < 12.3.5
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
Vulnerability Recap 4/29/24: Cisco, Microsoft, Palo Alto & More
Catch up on the vulnerabilities, updates, and workarounds preceding the week of April 29, 2024, from Cisco, Microsoft, Palo Alto, and more.
Maximum severity Flowmon bug has a public exploit, patch now
Proof-of-concept exploit code has been released for a top-severity security vulnerability in Progress Flowmon, a tool for monitoring network performance and visibility.
PoC for critical Progress Flowmon vulnerability released (CVE-2024-2389) - Help Net Security
A PoC exploit for an unauthenticated OS command injection vulnerability (CVE-2024-2389) in Progress Flowmon has been published.
References
EPSS Score
94% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
- π°
First article discovered by SecurityWeek
Vulnerability published
