CVE-2024-5011

7.5 HIGH

📋 TL;DR

An unauthenticated attacker can send specially crafted HTTP requests to the TestController Chart functionality in WhatsUp Gold, causing uncontrolled resource consumption and denial of service. This affects all WhatsUp Gold versions before 2023.1.3 that are exposed to network access.

💻 Affected Systems

Products:
  • WhatsUp Gold
Versions: All versions before 2023.1.3
Operating Systems: Windows (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations where the web interface is accessible. The vulnerability is in the TestController Chart functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service outage of WhatsUp Gold, disrupting network monitoring and potentially cascading to dependent systems.

🟠

Likely Case

Degraded performance or temporary unavailability of the WhatsUp Gold web interface and monitoring functions.

🟢

If Mitigated

Minimal impact if the vulnerability is patched or if network access controls prevent unauthenticated requests.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows remote attackers to cause denial of service without any credentials.
🏢 Internal Only: HIGH - Even internally, unauthenticated users or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires sending specially crafted HTTP requests but does not require authentication, making exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.1.3 or later

Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024

Restart Required: Yes

Instructions:

1. Download WhatsUp Gold 2023.1.3 or later from Progress Software. 2. Backup current configuration and data. 3. Install the update following vendor instructions. 4. Restart the WhatsUp Gold service.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to the WhatsUp Gold web interface to trusted IP addresses only using firewall rules.

Disable Unnecessary Functionality

windows

If possible, disable or restrict access to the TestController Chart functionality through application configuration.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WhatsUp Gold from untrusted networks.
  • Deploy rate limiting or web application firewall rules to block suspicious HTTP requests to the TestController endpoint.

🔍 How to Verify

Check if Vulnerable:

Check the WhatsUp Gold version in the web interface under Help > About, or examine the installed version in Windows Programs and Features.

Check Version:

Not applicable via command line; check through the web interface or Windows control panel.

Verify Fix Applied:

Confirm the version is 2023.1.3 or higher and test that the TestController Chart functionality responds normally to legitimate requests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual high volume of HTTP requests to /TestController/Chart endpoints
  • Increased CPU/memory usage logs from WhatsUp Gold service
  • Error logs indicating resource exhaustion

Network Indicators:

  • Spike in traffic to WhatsUp Gold web port (typically 80/443)
  • Pattern of malformed HTTP requests targeting TestController

SIEM Query:

source="WhatsUpGold" AND (uri_path="/TestController/Chart" OR event_description="resource exhaustion")

🔗 References

📤 Share & Export