Most severity Flowmon bug has a public exploit, patch now

Proof-of-concept exploit code has been launched for a top-severity safety vulnerability in Progress Flowmon, a software for monitoring community efficiency and visibility.

Progress Flowmon combines efficiency monitoring, diagnostics, and community detection and response options. It’s utilized by greater than 1,500 firms all over the world, together with SEGA, KIA, and TDK, Volkswagen, Orange, and Tietoevry.

The safety subject has the utmost severity rating of 10/10 and was found by researchers at Rhino Safety Labs. It’s presently tracked as CVE-2024-2389.

An attacker can exploiting the vulnerability can use a specifically crafted API request to achieve distant, unauthenticated entry to the Flowmon net interface and execute arbitrary system instructions.

Flowon developer Progress Software program first alerted in regards to the flaw on April 4, warning that it impacts variations of the product v12.x and v11.x. The corporate urged system admins to improve to the most recent releases, v12.3.4 and 11.1.14.

The safety replace was launched to all Flowmon prospects both mechanically by means of the ‘Automated bundle obtain’ system or manually from the seller’s obtain middle. Progress additionally really helpful upgrading all Flowmon modules afterwards.

Exploit code obtainable

In a report at the moment, Rhino Safety Labs launched technical particulars for the vulnerability together with a demo displaying how an attacker might exploit the difficulty to plant a webshell and escalate privileges to root.

The researchers clarify that they had been capable of inject instructions by manipulating the ‘pluginPath’ or ‘file parameters’ to embed malicious instructions. Utilizing the command substitution syntax , e.g. $(…), the researchers might obtain arbitrary command execution.

“The command executes blindly so it is not possible to see the output of the executed command, but it is possible to write a webshell to /var/www/shtml/,” the researchers clarify.

Gif
Exploit demo
Rhino Safety

It’s price noting that in an alert about two weeks in the past Italy’s CSIRT warned that an exploit had already change into obtainable. Certainly, BleepingComputer discovered {that a} safety researcher had revealed on April 10 a legitimate PoC for CVE-2024-2389 on X.

Flowmon servers uncovered

The variety of Flowmon cases uncovered on the general public net seems to differ significantly relying on the search engine.

At publishing time, a look on the Fofa search engine for community property exhibits that there are about 500 Flowmon servers uncovered on-line. Shodan and Hunter engines like google see lower than 100 cases.

On April 19, Progress Software program in a safety bulletin assured its prospects that there have been no reviews of energetic exploitation for CVE-2024-2389. Nevertheless, addressing the difficulty by upgrading to a protected model as quickly as doable is vital.

Recent articles

U.S. Sanctions Chinese language Cybersecurity Agency Over Treasury Hack Tied to Silk Hurricane

The U.S. Treasury Division's Workplace of International Property Management...

FTC cracks down on Genshin Impression gacha loot field practices

Genshin Impression developer Cognosphere (aka Hoyoverse)...

New ‘Sneaky 2FA’ Phishing Package Targets Microsoft 365 Accounts with 2FA Code Bypass

î ‚Jan 17, 2025î „Ravie LakshmananCybersecurity / Menace Intelligence Cybersecurity researchers have...