Progress Software Releases Security Advisory for WhatsUp Gold
Advisory addresses 15 security vulnerabilities that could lead to unauthorised access
Summary
Advisory addresses 15 security vulnerabilities that could lead to unauthorised access
Affected platforms
The following platforms are known to be affected:
Threat details
Exploitation of CVE-2024-4885
Proof-of-concept code is publicly available and exploitation attempts have been reported in the wild.
Introduction
Progress Software has released an advisory that addresses 15 vulnerabilities in the WhatsUp Gold system, including 3 critical remote code execution (RCE) vulnerabilities with a CVSSv3 score of 9.8. WhatsUp Gold is a network availability and performance monitoring package.
The 3 critical vulnerabilities are outlined below:
- CVE-2024-4883: In WhatsUp Gold versions released before 2023.1.3, a RCE issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe.
- CVE-2024-4884: In WhatsUp Gold versions released before 2023.1.3, an unauthenticated RCE vulnerability in Progress WhatsUpGold. The Apm.UI.Areas.APM.Controllers.CommunityController allows execution of commands with iisapppool\nmconsole privileges.
- CVE-2024-4485: In WhatsUp Gold versions released before 2023.1.3, an unauthenticated RCE vulnerability in Progress WhatsUpGold. The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.
Remediation advice
Affected organisations are encouraged to review Progress Software's advisory WhatsUp Gold Security Bulletin– June 2024 and apply the relevant updates.
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 7 August 2024 5:10 pm