What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general.

Learn more

PRTG Network Monitor

Intuitive to Use. Easy to manage.
More than 500,000 users rely on Paessler PRTG every day. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free Download

Top Tags

View all Tags

Is Paessler PRTG affected by CVE-2022-42889 (Text4Shell; Act4Shell)?



Is Paessler PRTG affected by CVE-2022-42889?

act4shell apache cve-2022-42889 java prtg text4shell

Created on Oct 20, 2022 9:00:08 AM by  Florian Weik (1,927) 2 2

1 Reply

Accepted Answer



This article applies to PRTG (+) and earlier versions.

English version

In response to the vulnerability in the Java library Apache Commons Text, we at Paessler can confirm that our software Paessler PRTG Network Monitor, Paessler PRTG Enterprise Monitor, and Paessler PRTG Hosted Monitor do not use the affected Apache Commons Text library version described in CVE-2022-42889.

Additional notes:

We’ll update this article if there is new information.

Deutsche Version

Als Reaktion auf die Verwundbarkeit in der Java Bibliothek Apache Commons Text, können wir bestätigen, dass unsere Software Paessler PRTG Network Monitor, Paessler PRTG Enterprise Monitor und Paessler PRTG Hosted Monitor die von CVE-2022-42889 betroffene Version der Apache Commons Text Bibliothek nicht verwendet.

Weitere Hinweise:

Bei neuen Informationen wird dieser Artikel aktualisiert.

Created on Oct 20, 2022 9:32:29 AM by  Florian Weik (1,927) 2 2

Last change on Oct 20, 2022 12:53:48 PM by  Florian Weik (1,927) 2 2

Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.