Is Paessler PRTG affected by CVE-2022-3786 and CVE-2022-3602?
Is Paessler PRTG affected by CVE-2022-3786 and CVE-2022-3602?
Modified on 2025-06-10 16:54:33 +0200
Disclaimer:
The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.
The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.
This article applies to PRTG 22.3.79.2108 (+) and earlier versions.
English version
In response to the vulnerabilities in OpenSSL 3.0, we at Paessler can confirm that our software Paessler PRTG Network Monitor, Paessler PRTG Enterprise Monitor, and Paessler PRTG Hosted Monitor are not affected by the vulnerabilities described in CVE-2022-3786 and CVE-2022-3602 because Paessler PRTG does not use OpenSSL 3.0.
Additional note:
We will update this article as soon as new information is available.
Deutsche Version
Als Reaktion auf die Verwundbarkeiten in OpenSSL 3.0, können wir bestätigen, dass unsere Software Paessler PRTG Network Monitor, Paessler PRTG Enterprise Monitor und Paessler PRTG Hosted Monitor von den in CVE-2022-3786 und CVE-2022-3602 beschriebenen Verwundbarkeiten nicht betroffen ist, da Paessler PRTG OpenSSL 3.0 nicht verwendet.
Weiterer Hinweis:
Bei neuen Informationen wird dieser Artikel aktualisiert.
Nov, 2022 - Permalink