CVE-2024-12106

9.4 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to configure LDAP settings in WhatsUp Gold, potentially enabling them to redirect authentication to malicious LDAP servers or disrupt legitimate authentication. Organizations running WhatsUp Gold versions before 2024.0.2 are affected.

💻 Affected Systems

Products:
  • WhatsUp Gold
Versions: All versions before 2024.0.2
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with LDAP configuration capability are vulnerable; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could redirect all authentication to a malicious LDAP server they control, enabling credential harvesting, account takeover, and complete compromise of the monitoring system.

🟠

Likely Case

Attackers modify LDAP settings to disrupt legitimate authentication, causing service outages and preventing administrators from accessing the monitoring system.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the WhatsUp Gold instance itself, though authentication disruption could still occur.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances extremely vulnerable to attack.
🏢 Internal Only: HIGH - Even internally, unauthenticated access to LDAP configuration represents a significant privilege escalation risk.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthenticated access to LDAP configuration, suggesting straightforward exploitation via web interface or API calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.0.2 or later

Vendor Advisory: https://www.progress.com/network-monitoring

Restart Required: Yes

Instructions:

1. Download WhatsUp Gold 2024.0.2 or later from Progress website. 2. Backup current configuration. 3. Install the update following vendor instructions. 4. Restart WhatsUp Gold services.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to WhatsUp Gold administration interfaces to trusted IP addresses only.

Use firewall rules to limit access to WhatsUp Gold ports (typically 80/443) to authorized administrative networks

Disable LDAP Configuration Interface

all

Temporarily disable or restrict access to LDAP configuration endpoints if possible.

Configure web server or application firewall to block access to LDAP configuration URLs

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WhatsUp Gold from untrusted networks
  • Deploy web application firewall with rules to detect and block LDAP configuration attempts

🔍 How to Verify

Check if Vulnerable:

Check WhatsUp Gold version in administration interface. If version is below 2024.0.2, system is vulnerable.

Check Version:

Check version in WhatsUp Gold web interface under Help > About, or examine installation directory version files.

Verify Fix Applied:

After patching, verify version shows 2024.0.2 or higher in administration interface.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated access to LDAP configuration endpoints
  • Changes to LDAP settings from unexpected IP addresses
  • Authentication failures following LDAP configuration changes

Network Indicators:

  • Unusual HTTP POST requests to LDAP configuration endpoints
  • Traffic from WhatsUp Gold to unexpected LDAP servers

SIEM Query:

source="whatsup_gold" AND (uri_path="/ldap/*" OR uri_path="/config/ldap*") AND http_method="POST" AND NOT src_ip IN [admin_ips]

🔗 References

📤 Share & Export