Critical Security Flaw in WhatsUp Gold Under Active Attack – Patch Now

Critical Security Flaw in WhatsUp Gold Under Active Attack - Patch Now

August 8, 2024 at 02:27AM

Progress Software’s WhatsUp Gold is facing active exploitation due to a critical security flaw (CVE-2024-4885, CVSS 9.8) allowing unauthenticated remote code execution. The flaw is being actively exploited, with a PoC exploit released by a security researcher. Exploitation attempts have been observed, emphasizing the urgency of applying the latest security updates.

Key takeaways from the meeting notes on the vulnerability in Progress Software WhatsUp Gold are as follows:

– A critical vulnerability, CVE-2024-4885, with a CVSS score of 9.8, is being actively exploited.
– The vulnerability allows unauthenticated remote code execution and affects versions released before 2023.1.3.
– Security researcher Sina Kheirkhah identified the flaw in the GetFileWithoutZip method, which fails to adequately validate user-supplied paths.
– A proof-of-concept (PoC) exploit for the vulnerability has been released by Kheirkhah.
– Progress Software has also addressed two more critical flaws, CVE-2024-4883 and CVE-2024-4884, which enable unauthenticated remote code execution.
– Additionally, a high-severity privilege escalation issue, CVE-2024-5009, has been identified, allowing local attackers to elevate their privileges.

It is crucial for administrators to apply the latest security updates and restrict traffic to trusted IP addresses to mitigate potential threats resulting from these vulnerabilities.

Full Article