A new critical vulnerability has been discovered in Progress Flowmon, assigned with CVE-2024-2389.
Progress Flowmon is a Cloud Application Performance monitoring solution that can help analyze network and application traffic.
Moreover, it can also be used for several purposes, such as Troubleshooting, network visibility, bandwidth monitoring, attack evidence and analysis, network capacity planning, and many others.
Last year, the progress software’s MOVEit Vulnerability was exploited widely by CL0P Ransomware Group.
Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .
However, this new vulnerability has been patched and a security advisory has also been released for addressing this vulnerability.
According to the advisory, the existence of this vulnerability has been confirmed in Flowmon versions v11.x and v12.x.
This vulnerability could allow an unauthenticated remote threat actor to gain access to the web interface of flowmon.
Once this access has been gained, the threat actor can then issue a specially crafted API command that will let the attacker execute arbitrary system commands without any authentication.
The severity for this vulnerability has been given a maximum of 10.0 (Critical).
Furthermore, this vulnerability also affects all the platforms of Flowmon versions 11.x and 12.x. Nevertheless, it has been confirmed that versions prior to 11.0 are not affected by this vulnerability.
However, there has been no evidence of threat actors exploiting this vulnerability in the wild.
Progress has immediately acted upon this vulnerability and has released the patched versions of Flowmon 12.3.5 and Flowmon 11.1.4.
In order to upgrade these versions, users can use the automatic package download feature on their Flowmon appliance or download the releases manually.
It is recommended that users of these product versions upgrade to the latest versions to prevent threat actors from exploiting this vulnerability.
Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide
The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…
White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…
The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…
Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…