This article applies to PRTG 22.214.171.1249(+) and earlier versions.
In response to the vulnerability in the OpenSSL library, we at Paessler can confirm that our software Paessler PRTG Network Monitor, Paessler PRTG Enterprise Monitor and Paessler PRTG Hosted Monitor do use the affected OpenSSL version described in CVE-2022-0778.
On March 24th, 2022 we released PRTG 126.96.36.1998 that includes the OpenSSL update to version 1.0.2zd that patches the vulnerability. We recommend that you install the update as soon as possible via the Auto-Update feature of PRTG.
Additional Notes: The ITOpsboard for users of PRTG Enterprise Monitor is not affected.
Possible Impact and Mitigation Steps:
The vulnerability can be abused to perform a DoS (denial of service) attack by using a specifically crafted certificate in TLS connections acting as server or client. An attacker can use this to impact the state of remote probes and the PRTG core server and, in the worst case, make them unreachable.
If you cannot update your systems, we recommend the following mitigation steps:
Monitor the status of the PRTG core server and the remote probe connections until you can install the update.
Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.