A new critical vulnerability has been discovered in Progress Flowmon, assigned with CVE-2024-2389.
Progress Flowmon is a Cloud Application Performance monitoring solution that can help analyze network and application traffic.
Moreover, it can also be used for several purposes, such as Troubleshooting, network visibility, bandwidth monitoring, attack evidence and analysis, network capacity planning, and many others.
Last year, the progress software’s MOVEit Vulnerability was exploited widely by CL0P Ransomware Group.
Trustifi’s Advanced threat protection prevents the widest spectrum of sophisticated attacks before they reach a user’s mailbox. Try Trustifi Free Threat Scan with Sophisticated AI-Powered Email Protection .
However, this new vulnerability has been patched and a security advisory has also been released for addressing this vulnerability.
According to the advisory, the existence of this vulnerability has been confirmed in Flowmon versions v11.x and v12.x.
This vulnerability could allow an unauthenticated remote threat actor to gain access to the web interface of flowmon.
Once this access has been gained, the threat actor can then issue a specially crafted API command that will let the attacker execute arbitrary system commands without any authentication.
The severity for this vulnerability has been given a maximum of 10.0 (Critical).
Furthermore, this vulnerability also affects all the platforms of Flowmon versions 11.x and 12.x. Nevertheless, it has been confirmed that versions prior to 11.0 are not affected by this vulnerability.
However, there has been no evidence of threat actors exploiting this vulnerability in the wild.
Progress has immediately acted upon this vulnerability and has released the patched versions of Flowmon 12.3.5 and Flowmon 11.1.4.
In order to upgrade these versions, users can use the automatic package download feature on their Flowmon appliance or download the releases manually.
It is recommended that users of these product versions upgrade to the latest versions to prevent threat actors from exploiting this vulnerability.
Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide
A newly disclosed vulnerability in Substack's custom domain setup could allow malicious actors to hijack…
Federal prosecutors have filed a detention memorandum urging the court to indefinitely detain Cameron John…
Security researchers have publicly disclosed a proof-of-concept (PoC) exploit for CVE-2025-21333, a critical elevation-of-privilege vulnerability in…
A sophisticated kernel exploit leveraging CVE-2023-32434, an integer overflow vulnerability in Apple’s XNU virtual memory…
Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network to…
At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking vulnerability…