CVE-2025-2572

5.6 MEDIUM

📋 TL;DR

An unauthenticated database manipulation vulnerability in WhatsUp Gold allows attackers to modify the WrlsMacAddressGroup table without credentials. This affects all WhatsUp Gold installations running versions before 2024.0.3, potentially impacting network monitoring integrity.

💻 Affected Systems

Products:
  • WhatsUp Gold
Versions: All versions before 2024.0.3
Operating Systems: Windows (primary platform for WhatsUp Gold)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installations; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate wireless device grouping data, causing network monitoring failures, false alerts, or disruption of wireless network management capabilities.

🟠

Likely Case

Unauthorized modification of wireless MAC address groupings leading to inaccurate network monitoring reports and potential operational confusion.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to potential data integrity issues within the wireless monitoring module.

🌐 Internet-Facing: HIGH if WhatsUp Gold web interface is exposed to internet, as vulnerability requires no authentication.
🏢 Internal Only: MEDIUM for internal networks, as attackers still need network access but no credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-287 indicates improper authentication, making exploitation straightforward for attackers with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.0.3 or later

Vendor Advisory: https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html

Restart Required: Yes

Instructions:

1. Download WhatsUp Gold 2024.0.3 or later from Progress website. 2. Backup current installation and database. 3. Run installer with administrative privileges. 4. Restart WhatsUp Gold services after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to WhatsUp Gold interface to authorized management networks only

Web Application Firewall Rules

all

Implement WAF rules to block unauthorized database manipulation attempts

🧯 If You Can't Patch

  • Implement strict network access controls to limit WhatsUp Gold interface access to trusted IP addresses only
  • Monitor database modification logs for unauthorized changes to WrlsMacAddressGroup table

🔍 How to Verify

Check if Vulnerable:

Check WhatsUp Gold version via web interface Admin > About or via installed program version

Check Version:

Not applicable via command line; check via web interface or Windows Programs and Features

Verify Fix Applied:

Verify version is 2024.0.3 or higher and test that unauthenticated requests to modify WrlsMacAddressGroup are properly rejected

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized database modification attempts
  • Failed authentication attempts followed by database operations
  • Unexpected modifications to WrlsMacAddressGroup table

Network Indicators:

  • Unusual database query patterns from unauthenticated sources
  • HTTP requests to WhatsUp Gold database endpoints without authentication headers

SIEM Query:

source="whatsup_gold" AND (event_type="database_modification" AND user="anonymous") OR (http_status=200 AND uri CONTAINS "WrlsMacAddressGroup" AND auth_token=null)

🔗 References

📤 Share & Export