A critical vulnerability, identified as CVE-2024-2389, has been uncovered in Progress Flowmon, a Cloud Application Performance monitoring solution widely used for network and application traffic analysis. This vulnerability, affecting versions v11.x and v12.x, enables unauthenticated remote attackers to access the web interface and execute arbitrary system commands without authentication. Rated with a severity score of 10.0 (Critical), this flaw poses significant risks to organizations utilizing Flowmon. However, Progress promptly released patched versions (12.3.5 and 11.1.4) to address the vulnerability and mitigate potential exploitation.
The vulnerability allows threat actors to exploit the web interface of Flowmon and issue specially crafted API commands, granting them unauthorized access to execute arbitrary system commands. Although there is no evidence of exploitation in the wild, the severity of this flaw necessitates immediate action from affected users. Progress urges users to upgrade to the latest patched versions to safeguard against potential exploitation by threat actors.
Progress’s swift response underscores the importance of proactive security measures in addressing critical vulnerabilities and protecting organizations from potential cyber threats. By promptly releasing security advisories and patches, Progress aims to enhance the resilience of Flowmon users against emerging security risks.