CVE-2024-4885

9.8 CRITICAL

📋 TL;DR

An unauthenticated remote code execution vulnerability in Progress WhatsUp Gold allows attackers to execute arbitrary commands with IIS application pool privileges. This affects WhatsUp Gold versions before 2023.1.3, potentially compromising network monitoring systems.

💻 Affected Systems

Products:
  • Progress WhatsUp Gold
Versions: All versions before 2023.1.3
Operating Systems: Windows (typically runs on Windows Server)
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the WhatsUp.ExportUtilities.Export.GetFileWithoutZip component and affects default installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal credentials, pivot to other systems, and disrupt network monitoring operations.

🟠

Likely Case

Attackers gain initial foothold on the network monitoring system, install backdoors, and use it as a pivot point for lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring that detects exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability is unauthenticated and allows remote code execution, making internet-facing instances extremely vulnerable to exploitation.
🏢 Internal Only: HIGH - Even internally, this vulnerability can be exploited by attackers who gain network access, potentially leading to lateral movement and privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is unauthenticated and has a high CVSS score of 9.8, making it attractive for exploitation. CISA has added it to their Known Exploited Vulnerabilities catalog.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.1.3 and later

Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024

Restart Required: Yes

Instructions:

1. Download WhatsUp Gold version 2023.1.3 or later from the Progress website. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the WhatsUp Gold service and IIS. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Access Restriction

windows

Restrict network access to WhatsUp Gold to only trusted IP addresses and networks

Use Windows Firewall: New-NetFirewallRule -DisplayName "Block WhatsUp Gold External" -Direction Inbound -Protocol TCP -LocalPort 80,443 -RemoteAddress Any -Action Block

Application Pool Isolation

windows

Run WhatsUp Gold in a dedicated application pool with minimal privileges

In IIS Manager: 1. Create new application pool. 2. Set identity to custom account with minimal privileges. 3. Assign WhatsUp Gold site to this pool.

🧯 If You Can't Patch

  • Immediately isolate the WhatsUp Gold server from the internet and restrict internal network access
  • Implement strict network monitoring and alerting for suspicious activity targeting the WhatsUp Gold server

🔍 How to Verify

Check if Vulnerable:

Check the WhatsUp Gold version in the web interface under Help > About, or examine the installed version in Windows Programs and Features.

Check Version:

In WhatsUp Gold web interface: Navigate to Help > About, or check registry: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Ipswitch\WhatsUp\Version

Verify Fix Applied:

Verify the version is 2023.1.3 or later and test that the Export.GetFileWithoutZip functionality works properly without allowing unauthorized access.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to Export.GetFileWithoutZip endpoints in IIS logs
  • Suspicious process creation events from w3wp.exe (IIS worker process)
  • Failed authentication attempts followed by successful exploitation

Network Indicators:

  • Unusual outbound connections from the WhatsUp Gold server
  • Traffic to known malicious IPs or domains from the server
  • Unexpected network scanning originating from the server

SIEM Query:

source="iis_logs" AND (uri="*Export.GetFileWithoutZip*" OR status=200 AND uri="*/export/*") | stats count by src_ip, uri

🔗 References

📤 Share & Export