CVE-2024-7763

9.8 CRITICAL

📋 TL;DR

WhatsUp Gold versions before 2024.0.0 contain an authentication bypass vulnerability that allows attackers to obtain encrypted user credentials without proper authentication. This affects all organizations running vulnerable versions of WhatsUp Gold network monitoring software.

💻 Affected Systems

Products:
  • WhatsUp Gold
Versions: All versions before 2024.0.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: WhatsUp Gold typically runs on Windows Server environments. The vulnerability exists in the application itself regardless of Windows version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the monitoring system, potentially compromising the entire network infrastructure and using stolen credentials to move laterally across systems.

🟠

Likely Case

Attackers obtain encrypted credentials that could be cracked offline, leading to unauthorized access to the WhatsUp Gold system and potentially other systems using the same credentials.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the WhatsUp Gold system itself, though credential exposure remains a significant risk.

🌐 Internet-Facing: HIGH - If WhatsUp Gold is exposed to the internet, attackers can remotely exploit this without authentication to steal credentials.
🏢 Internal Only: HIGH - Even internally, any attacker with network access to the WhatsUp Gold instance can exploit this vulnerability to obtain credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The authentication bypass nature suggests relatively simple exploitation. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.0.0 or later

Vendor Advisory: https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024

Restart Required: Yes

Instructions:

1. Download WhatsUp Gold 2024.0.0 or later from Progress Software. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the WhatsUp Gold service and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to WhatsUp Gold to only trusted IP addresses and networks

Configure firewall rules to limit access to specific source IPs

Credential Rotation

all

Change all passwords and credentials used by WhatsUp Gold, especially administrative accounts

🧯 If You Can't Patch

  • Isolate WhatsUp Gold system on a dedicated VLAN with strict access controls
  • Implement network monitoring for unusual authentication attempts or credential access patterns

🔍 How to Verify

Check if Vulnerable:

Check WhatsUp Gold version in the web interface under Help > About or via the installation directory properties

Check Version:

Check version in web interface or examine file properties of WhatsUpGold.exe

Verify Fix Applied:

Verify version is 2024.0.0 or later and test authentication mechanisms work properly

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts
  • Access to credential-related endpoints without proper authentication
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • Unusual traffic patterns to WhatsUp Gold authentication endpoints
  • Requests to credential retrieval APIs from unexpected sources

SIEM Query:

source="WhatsUpGold" AND (event_type="authentication" OR event_type="credential_access") AND result="success" AND user="unknown"

🔗 References

📤 Share & Export