Home

Description

In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.  The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.

PUBLISHED Reserved 2024-05-14 | Published 2024-06-25 | Updated 2025-10-21 | Assigner ProgressSoftware




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA Known Exploited Vulnerability

Date added 2025-03-03 | Due date 2025-03-24

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
affected

2023.1.0 (semver) before 2023.1.3
affected

Credits

Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative finder

References

www.progress.com/network-monitoring product

community.progress.com/...p-Gold-Security-Bulletin-June-2024 vendor-advisory

cve.org (CVE-2024-4885)

nvd.nist.gov (CVE-2024-4885)

Download JSON