Vulnerability Details CVE-2020-10374
A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.049
EPSS Ranking 89.0%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2020-10374
-
cpe:2.3:a:paessler:prtg_network_monitor:19.2.50
-
cpe:2.3:a:paessler:prtg_network_monitor:19.2.50.2842
-
cpe:2.3:a:paessler:prtg_network_monitor:19.3.51
-
cpe:2.3:a:paessler:prtg_network_monitor:19.3.51.2725
-
cpe:2.3:a:paessler:prtg_network_monitor:19.3.51.2830
-
cpe:2.3:a:paessler:prtg_network_monitor:19.3.52
-
cpe:2.3:a:paessler:prtg_network_monitor:19.3.52.3502
-
cpe:2.3:a:paessler:prtg_network_monitor:19.4.52.3515
-
cpe:2.3:a:paessler:prtg_network_monitor:19.4.53
-
cpe:2.3:a:paessler:prtg_network_monitor:19.4.53.1912
-
cpe:2.3:a:paessler:prtg_network_monitor:19.4.54
-
cpe:2.3:a:paessler:prtg_network_monitor:19.4.54.1506
-
cpe:2.3:a:paessler:prtg_network_monitor:20.1.55
-
cpe:2.3:a:paessler:prtg_network_monitor:20.1.55.1775
-
cpe:2.3:a:paessler:prtg_network_monitor:20.1.56