CVE-2024-5013

7.5 HIGH

📋 TL;DR

An unauthenticated Denial of Service vulnerability in WhatsUp Gold allows attackers to force the application into the SetAdminPassword installation step, making it inaccessible. This affects all WhatsUp Gold versions before 2023.1.3. Organizations using vulnerable versions with internet-facing instances are at highest risk.

💻 Affected Systems

Products:
  • WhatsUp Gold
Versions: All versions before 2023.1.3
Operating Systems: Windows Server (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete application unavailability requiring reinstallation or restoration from backup, disrupting network monitoring and potentially masking other security incidents.

🟠

Likely Case

Temporary service disruption requiring administrator intervention to restore normal operation, impacting network visibility and monitoring capabilities.

🟢

If Mitigated

No impact if patched or properly firewalled; minimal disruption if detected and mitigated quickly.

🌐 Internet-Facing: HIGH - Unauthenticated attack vector makes internet-facing instances extremely vulnerable to disruption.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and minimal technical skill to exploit, making it attractive for disruption attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023.1.3 and later

Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024

Restart Required: Yes

Instructions:

1. Download WhatsUp Gold 2023.1.3 or later from Progress support portal. 2. Backup current configuration and database. 3. Run installer with administrative privileges. 4. Follow upgrade wizard. 5. Restart application services.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to WhatsUp Gold administration interfaces to trusted IP addresses only.

Configure firewall rules to allow only specific source IPs to access WhatsUp Gold ports (typically 80/443 and management ports)

Reverse Proxy with Authentication

all

Place WhatsUp Gold behind a reverse proxy that requires authentication before forwarding requests.

Configure nginx/apache/IIS as reverse proxy with authentication enabled for WhatsUp Gold endpoints

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to WhatsUp Gold to authorized administrative networks only.
  • Deploy intrusion detection/prevention systems to monitor for DoS attack patterns against the WhatsUp Gold application.

🔍 How to Verify

Check if Vulnerable:

Check WhatsUp Gold version in administration console or via Help > About. If version is earlier than 2023.1.3, system is vulnerable.

Check Version:

In WhatsUp Gold web interface: Navigate to Help > About to view version information.

Verify Fix Applied:

Verify version is 2023.1.3 or later in administration console. Test application functionality remains available after attempted exploitation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to SetAdminPassword endpoint
  • Multiple failed authentication attempts followed by service disruption
  • Application logs showing unexpected transition to installation state

Network Indicators:

  • Unusual traffic spikes to WhatsUp Gold administration ports from unauthenticated sources
  • HTTP requests to SetAdminPassword-related endpoints from external IPs

SIEM Query:

source="WhatsUpGold" AND (event="SetAdminPassword" OR event="installation_step") AND src_ip NOT IN [trusted_admin_ips]

🔗 References

📤 Share & Export