CVE-2023-6595

7.5 HIGH

📋 TL;DR

CVE-2023-6595 is an authentication bypass vulnerability in WhatsUp Gold network monitoring software. Unauthenticated attackers can access an API endpoint to enumerate credential information stored in the system. Organizations using WhatsUp Gold versions before 2023.1 are affected.

💻 Affected Systems

Products:
  • Progress WhatsUp Gold
Versions: All versions before 2023.1
Operating Systems: Windows Server (primary platform)
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal all stored credentials (SSH keys, SNMP community strings, database passwords) leading to complete network compromise and lateral movement.

🟠

Likely Case

Attackers would harvest credentials for network devices and systems monitored by WhatsUp Gold, enabling unauthorized access to infrastructure.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to the WhatsUp Gold system itself.

🌐 Internet-Facing: HIGH - If WhatsUp Gold is exposed to the internet, attackers can remotely exploit this without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to escalate privileges and access credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request to the vulnerable API endpoint; no special tools or skills required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.1 and later

Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-December-2023

Restart Required: Yes

Instructions:

1. Download WhatsUp Gold 2023.1 or later from Progress support portal. 2. Backup current configuration and database. 3. Run installer to upgrade. 4. Restart WhatsUp Gold services.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to WhatsUp Gold management interface to trusted IPs only.

Use firewall rules to allow only specific source IPs to TCP ports 80/443 on WhatsUp Gold server

API Endpoint Blocking

all

Block access to the specific vulnerable API endpoint using web application firewall or reverse proxy.

Add rule to block requests to /api/v1/credentials/* or similar credential enumeration endpoints

🧯 If You Can't Patch

  • Isolate WhatsUp Gold server in separate VLAN with strict access controls
  • Monitor for unusual API access patterns and credential enumeration attempts

🔍 How to Verify

Check if Vulnerable:

Check WhatsUp Gold version in web interface (Help > About) or via registry: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\WhatsUp Gold\Version

Check Version:

reg query "HKLM\SOFTWARE\WOW6432Node\Ipswitch\WhatsUp Gold" /v Version

Verify Fix Applied:

Verify version is 2023.1 or higher and test that unauthenticated API requests to credential endpoints return authentication errors.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated API requests to credential-related endpoints
  • Multiple failed authentication attempts followed by successful credential enumeration

Network Indicators:

  • Unusual HTTP GET requests to /api/v1/credentials/* from untrusted sources
  • Spike in API traffic from single source

SIEM Query:

source="whatsup_gold_logs" AND (uri_path="/api/v1/credentials/*" OR endpoint="credential") AND user="anonymous" OR auth_status="failed"

🔗 References

📤 Share & Export