CVE-2024-2389
CRITICAL EXPLOITED NUCLEIProgress Kemp Flowmon - Command Injection
Title source: nucleiDescription
In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified. An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.
Exploits (3)
metasploit
WORKING POC
EXCELLENT
by Dave Yesland with Rhino Security Labs · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/progress_flowmon_unauth_cmd_injection.rb
metasploit
WORKING POC
EXCELLENT
by Dave Yesland with Rhino Security Labs · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/progress_flowmon_sudo_privesc_2024.rb
Nuclei Templates (1)
Progress Kemp Flowmon - Command Injection
CRITICALVERIFIEDby pdresearch,parthmalhotra
Shodan:
Server: Flowmon
Scores
CVSS v3
10.0
EPSS
0.9430
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2024-04-26
CWE
CWE-78
Status
published
Products (1)
progress/flowmon
< 11.1.14
Published
Apr 02, 2024
Tracked Since
Feb 18, 2026