Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4885: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Progress Software Corporation WhatsUp Gold

0
Critical
VulnerabilityCVE-2024-4885cvecve-2024-4885cwe-22
Published: Tue Jun 25 2024 (06/25/2024, 19:48:15 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software Corporation
Product: WhatsUp Gold

Description

In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.  The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:25:41 UTC

Technical Analysis

CVE-2024-4885 is a critical remote code execution vulnerability identified in Progress Software Corporation's WhatsUp Gold, a widely used network monitoring and management solution. The flaw is a path traversal vulnerability (CWE-22) located in the WhatsUp.ExportUtilities.Export.GetFileWithoutZip function. This vulnerability allows an unauthenticated attacker to manipulate file path inputs to escape restricted directories and execute arbitrary commands on the underlying system. The commands execute with the privileges of the iisapppool\nmconsole account, which typically has significant permissions on the host, potentially allowing full system compromise. The vulnerability affects WhatsUp Gold versions prior to 2023.1.3, with 2023.1.0 explicitly mentioned as vulnerable. The CVSS v3.1 base score is 9.8, reflecting the ease of exploitation (network vector, no privileges or user interaction required), and the severe impact on confidentiality, integrity, and availability. While no public exploits have been observed yet, the critical nature and exposure of this vulnerability make it a prime target for attackers. The lack of authentication requirement means any attacker with network access to the affected service can attempt exploitation, increasing the attack surface. This vulnerability could lead to unauthorized data access, system takeover, lateral movement within networks, and disruption of network monitoring capabilities.

Potential Impact

For European organizations, the impact of CVE-2024-4885 is substantial. WhatsUp Gold is commonly used in enterprise environments for network monitoring, alerting, and management, often integrated into critical IT infrastructure. Exploitation could lead to unauthorized access to sensitive network data, disruption of monitoring services, and full system compromise, potentially affecting business continuity and data integrity. Critical sectors such as finance, healthcare, telecommunications, and government agencies relying on WhatsUp Gold for network visibility are particularly at risk. The ability to execute code remotely without authentication means attackers can rapidly compromise systems, potentially deploying ransomware or conducting espionage. Additionally, compromised monitoring tools can be used to mask malicious activities, complicating incident detection and response. The widespread use of WhatsUp Gold in European enterprises and public sector organizations amplifies the threat, making timely mitigation crucial to prevent large-scale operational disruptions and data breaches.

Mitigation Recommendations

1. Immediate upgrade to WhatsUp Gold version 2023.1.3 or later, where the vulnerability is patched, is the most effective mitigation. 2. If patching is not immediately possible, restrict network access to the WhatsUp Gold management interfaces using firewalls or network segmentation to limit exposure to trusted administrators only. 3. Implement strict access controls and monitoring on the iisapppool\nmconsole account to detect unusual activity. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the vulnerable function. 5. Conduct thorough network and host-based intrusion detection to identify exploitation attempts or suspicious command execution. 6. Review and harden the configuration of WhatsUp Gold, disabling unnecessary services or features that could be exploited. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8. Monitor vendor advisories and threat intelligence feeds for emerging exploit information and apply updates promptly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ProgressSoftware
Date Reserved
2024-05-14T18:28:11.852Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b5247d717aace26bb4

Added to database: 10/21/2025, 7:06:29 PM

Last enriched: 10/21/2025, 7:25:41 PM

Last updated: 10/30/2025, 12:00:59 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats