CVE-2024-6670

9.8 CRITICAL

📋 TL;DR

An unauthenticated SQL injection vulnerability in WhatsUp Gold allows attackers to retrieve encrypted user passwords. This affects all WhatsUp Gold versions before 2024.0.0. Organizations using vulnerable versions are at risk of credential compromise.

💻 Affected Systems

Products:
  • Progress WhatsUp Gold
Versions: All versions before 2024.0.0
Operating Systems: Windows (primary deployment platform)
Default Config Vulnerable: ⚠️ Yes
Notes: All standard installations are vulnerable; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access, pivot to other systems, and potentially achieve full network compromise through credential reuse or decryption.

🟠

Likely Case

Attackers retrieve encrypted passwords, attempt offline cracking, and gain unauthorized access to the WhatsUp Gold system and connected network resources.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the WhatsUp Gold system itself, though credential exposure remains a concern.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows direct attack from the internet without any credentials.
🏢 Internal Only: HIGH - Even internally, unauthenticated access means any compromised internal host or malicious insider can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

SQL injection vulnerabilities are commonly weaponized, and CISA has added this to their Known Exploited Vulnerabilities catalog, indicating active exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.0.0 or later

Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024

Restart Required: Yes

Instructions:

1. Download WhatsUp Gold 2024.0.0 or later from Progress support portal. 2. Backup current configuration and database. 3. Run the installer to upgrade. 4. Restart the WhatsUp Gold service and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to WhatsUp Gold to only trusted administrative networks

Web Application Firewall

all

Deploy a WAF with SQL injection protection rules in front of WhatsUp Gold

🧯 If You Can't Patch

  • Isolate WhatsUp Gold system on a dedicated VLAN with strict firewall rules allowing only necessary administrative access
  • Implement additional authentication layer (VPN, reverse proxy with MFA) for accessing WhatsUp Gold interface

🔍 How to Verify

Check if Vulnerable:

Check WhatsUp Gold version via web interface (Help > About) or installation directory properties

Check Version:

Check 'About' in web interface or examine installed programs in Windows Control Panel

Verify Fix Applied:

Confirm version is 2024.0.0 or later and test that SQL injection attempts are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts followed by successful access
  • Requests with SQL syntax in URL parameters

Network Indicators:

  • Unusual outbound connections from WhatsUp Gold server
  • Traffic patterns suggesting database enumeration

SIEM Query:

source="whatsup_gold" AND (url="*SELECT*" OR url="*UNION*" OR url="*FROM*users*")

🔗 References

📤 Share & Export