CVE-2024-46909

9.8 CRITICAL

📋 TL;DR

CVE-2024-46909 is a critical remote code execution vulnerability in WhatsUp Gold network monitoring software. Unauthenticated attackers can exploit this to execute arbitrary code with service account privileges, potentially compromising the entire monitoring system. All WhatsUp Gold installations before version 2024.0.1 are affected.

💻 Affected Systems

Products:
  • Progress WhatsUp Gold
Versions: All versions before 2024.0.1
Operating Systems: Windows (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal credentials, pivot to other systems, and disrupt network monitoring operations.

🟠

Likely Case

Attackers gain initial foothold on the network, deploy ransomware or crypto-miners, and use the compromised system to attack other internal resources.

🟢

If Mitigated

Attack attempts are detected and blocked by network controls, with minimal impact due to proper segmentation and monitoring.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances immediate targets for automated attacks.
🏢 Internal Only: HIGH - Even internally accessible instances are at significant risk from insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated remote code execution, making it highly attractive to attackers. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.0.1 or later

Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024

Restart Required: Yes

Instructions:

1. Download WhatsUp Gold 2024.0.1 or later from Progress support portal. 2. Backup current configuration and database. 3. Run the installer to upgrade. 4. Restart WhatsUp Gold services. 5. Verify successful upgrade and functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to WhatsUp Gold instances using firewall rules

# Example firewall rule to restrict access to trusted IPs only
# Windows: New-NetFirewallRule -DisplayName 'WhatsUpGold Access' -Direction Inbound -LocalPort 80,443 -Protocol TCP -RemoteAddress 10.0.0.0/8 -Action Allow

Application Layer Filtering

all

Implement WAF rules to block suspicious requests to WhatsUp Gold endpoints

# Example ModSecurity rule: SecRule REQUEST_URI "@rx ^/api/" "id:1001,phase:1,deny,status:403"

🧯 If You Can't Patch

  • Immediately isolate WhatsUp Gold servers from internet and restrict internal access to only necessary administrative systems
  • Implement strict network monitoring and alerting for any unusual activity targeting WhatsUp Gold instances

🔍 How to Verify

Check if Vulnerable:

Check WhatsUp Gold version in Administration > About. If version is below 2024.0.1, the system is vulnerable.

Check Version:

In WhatsUp Gold web interface: Navigate to Administration > About to view version

Verify Fix Applied:

After patching, verify version shows 2024.0.1 or higher in Administration > About. Test monitoring functionality remains operational.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from WhatsUp Gold service account
  • Failed authentication attempts followed by successful exploitation patterns
  • Unexpected network connections from WhatsUp Gold server

Network Indicators:

  • Unusual outbound connections from WhatsUp Gold server to external IPs
  • Suspicious HTTP requests to WhatsUp Gold API endpoints from unauthenticated sources

SIEM Query:

source="whatsup_gold.logs" AND (event_type="process_creation" AND parent_process="WhatsUpGoldService") OR (http_request="POST /api/*" AND src_ip NOT IN trusted_networks)

🔗 References

📤 Share & Export