What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general.

Learn more

PRTG Network Monitor

Intuitive to Use. Easy to manage.
More than 500,000 users rely on Paessler PRTG every day. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free Download

Top Tags


View all Tags

Is Paessler PRTG affected by CVE-2022-3786 and CVE-2022-3602?

Votes:

0

Is Paessler PRTG affected by CVE-2022-3786 and CVE-2022-3602?

cve-2022-3602 cve-2022-3786 openssl prtg

Created on Nov 2, 2022 9:46:50 AM



1 Reply

Accepted Answer

Votes:

0

This article applies to PRTG 22.3.79.2108 (+) and earlier versions.


English version

In response to the vulnerabilities in OpenSSL 3.0, we at Paessler can confirm that our software Paessler PRTG Network Monitor, Paessler PRTG Enterprise Monitor, and Paessler PRTG Hosted Monitor are not affected by the vulnerabilities described in CVE-2022-3786 and CVE-2022-3602 because Paessler PRTG does not use OpenSSL 3.0.


Additional note:

  • ITOps Board for users of PRTG Enterprise Monitor is not affected.

We will update this article as soon as new information is available.


Deutsche Version

Als Reaktion auf die Verwundbarkeiten in OpenSSL 3.0, können wir bestätigen, dass unsere Software Paessler PRTG Network Monitor, Paessler PRTG Enterprise Monitor und Paessler PRTG Hosted Monitor von den in CVE-2022-3786 und CVE-2022-3602 beschriebenen Verwundbarkeiten nicht betroffen ist, da Paessler PRTG OpenSSL 3.0 nicht verwendet.


Weiterer Hinweis:

  • Das ITOps Board für NutzerInnen von PRTG Enterprise Monitor ist nicht betroffen.

Bei neuen Informationen wird dieser Artikel aktualisiert.

Created on Nov 2, 2022 10:00:15 AM




Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.