{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2018-06-26T00:00:00.000Z","descriptions":[{"lang":"en","value":"An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-01-28T15:06:06.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html"},{"name":"46527","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/46527/"},{"name":"20180626 PRTG < 18.2.39 Command Injection","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/542103/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2018-9276","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html"},{"name":"46527","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/46527/"},{"name":"20180626 PRTG < 18.2.39 Command Injection","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/542103/100/0/threaded"},{"name":"http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T07:17:52.028Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/148334/PRTG-Command-Injection.html"},{"name":"46527","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/46527/"},{"name":"20180626 PRTG < 18.2.39 Command Injection","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/542103/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/161183/PRTG-Network-Monitor-Remote-Code-Execution.html"}]},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":7.2,"attackVector":"NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"HIGH","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2018-9276","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-04T15:48:24.308075Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2025-02-04","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-9276"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-9276","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"}]}],"timeline":[{"time":"2025-02-04T00:00:00.000Z","lang":"en","value":"CVE-2018-9276 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:45:50.232Z"}}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2018-9276","datePublished":"2018-07-02T16:00:00.000Z","dateReserved":"2018-04-04T00:00:00.000Z","dateUpdated":"2025-10-21T23:45:50.232Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}