CVE-2024-46905

8.8 HIGH

📋 TL;DR

A SQL injection vulnerability in WhatsUp Gold versions before 2024.0.1 allows authenticated users with Network Manager permissions to escalate privileges to admin accounts. This affects organizations using vulnerable versions of WhatsUp Gold for network monitoring.

💻 Affected Systems

Products:
  • WhatsUp Gold
Versions: All versions before 2024.0.1
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with at least Network Manager permissions; not exploitable by unauthenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the WhatsUp Gold instance, potentially compromising the entire network monitoring infrastructure and using it as a foothold for lateral movement.

🟠

Likely Case

Malicious insiders or compromised accounts with Network Manager permissions escalate to admin, gaining unauthorized access to sensitive network data and configuration controls.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the WhatsUp Gold system itself, though administrative compromise remains significant.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires understanding of WhatsUp Gold's database structure and authentication mechanisms; authenticated access lowers barrier.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.0.1 or later

Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024

Restart Required: No

Instructions:

1. Download WhatsUp Gold 2024.0.1 or later from Progress support portal. 2. Backup current configuration and database. 3. Run the installer to upgrade. 4. Verify successful upgrade in administration console.

🔧 Temporary Workarounds

Restrict Network Manager Permissions

all

Temporarily reduce the number of users with Network Manager permissions to only essential personnel.

Navigate to Administration > Security > Users in WhatsUp Gold, review and modify user permissions.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WhatsUp Gold from critical systems.
  • Enable detailed logging and monitoring for privilege escalation attempts and unusual admin activity.

🔍 How to Verify

Check if Vulnerable:

Check WhatsUp Gold version in the web interface under Help > About. If version is below 2024.0.1, the system is vulnerable.

Check Version:

Not applicable - check via web interface or installation directory properties.

Verify Fix Applied:

After patching, verify version shows 2024.0.1 or higher in Help > About. Test that authenticated users cannot perform unauthorized privilege escalation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed privilege escalation attempts followed by success
  • User account permission changes from Network Manager to Admin

Network Indicators:

  • Unexpected database connections from WhatsUp Gold application server
  • Anomalous authentication patterns to admin endpoints

SIEM Query:

source="whatsup_gold_logs" AND (event_type="permission_change" OR sql_query="*UPDATE*users*SET*role*")

🔗 References

📤 Share & Export