Latest Flowmon vulnerability #
On April 2, 2024, Progress Software disclosed a vulnerability in their Flowmon Packet Investigator (or simply “Flowmon”) product.
CVE-2024-2389 is rated extremely critical with CVSS score of 10.0 and allows unauthenticated remote attackers to execute arbitrary code on vulnerable systems.
What is the impact? #
Successful exploitation of these vulnerabilities would allow an attacker to execute arbitrary code, read potentially sensitive memory, or create a denial-of-service (DoS) condition on affected devices.
Are updates or workarounds available? #
Progress Software has released updates for all affected versions (Flowmon 11 and Flowmon 12) and all users are urged to update as quickly as possible.
How do I find potentially vulnerable systems with runZero? #
From the Service Inventory, use the following query to locate systems running potentially vulnerable software:
product:"Flowmon" OR html.title:"Flowmon Web Interface"