Learn about CVE-2018-19411, where an authenticated user in PRTG Network Monitor can escalate privileges by creating a new user with read-write access. Find out the impact, affected versions, and mitigation steps.
In versions prior to 18.2.40.1683, an authenticated user with a read-only account can exploit PRTG Network Monitor by creating a new user with read-write privileges (including administrator access) using an HTTP request. This vulnerability occurs due to the lack of proper user rights verification in the /api/addusers endpoint.
Understanding CVE-2018-19411
PRTG Network Monitor before 18.2.40.1683 allows an authenticated user with a read-only account to create another user with a read-write account (including administrator) via an HTTP request because /api/addusers doesn't check, or doesn't properly check, user rights.
What is CVE-2018-19411?
The Impact of CVE-2018-19411
Technical Details of CVE-2018-19411
PRTG Network Monitor before version 18.2.40.1683 is affected by this vulnerability.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
It is crucial to take immediate steps to address and prevent the exploitation of CVE-2018-19411.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates