Skip to main content

Progress Software Releases Security Advisory for WhatsUp Gold

Advisory addresses 15 security vulnerabilities that could lead to unauthorised access

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Advisory addresses 15 security vulnerabilities that could lead to unauthorised access


Affected platforms

The following platforms are known to be affected:

Threat details

Exploitation of CVE-2024-4885

Proof-of-concept code is publicly available and exploitation attempts have been reported in the wild.


Introduction

Progress Software has released an advisory that addresses 15 vulnerabilities in the WhatsUp Gold system, including 3 critical remote code execution (RCE) vulnerabilities with a CVSSv3 score of 9.8. WhatsUp Gold is a network availability and performance monitoring package.

The 3 critical vulnerabilities are outlined below:

  • CVE-2024-4883: In WhatsUp Gold versions released before 2023.1.3, a RCE issue exists in Progress WhatsUp Gold. This vulnerability allows an unauthenticated attacker to achieve the RCE as a service account through NmApi.exe.
  • CVE-2024-4884: In WhatsUp Gold versions released before 2023.1.3, an unauthenticated RCE vulnerability in Progress WhatsUpGold.  The Apm.UI.Areas.APM.Controllers.CommunityController allows execution of commands with iisapppool\nmconsole privileges.
  • CVE-2024-4485: In WhatsUp Gold versions released before 2023.1.3, an unauthenticated RCE vulnerability in Progress WhatsUpGold.  The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.

Remediation advice

Affected organisations are encouraged to review Progress Software's advisory WhatsUp Gold Security Bulletin– June 2024 and apply the relevant updates.



CVE Vulnerabilities

Last edited: 7 August 2024 5:10 pm