CVE-2024-4885: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Progress Software Corporation WhatsUp Gold
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.
AI Analysis
Technical Summary
CVE-2024-4885 is a critical remote code execution vulnerability identified in Progress Software Corporation's WhatsUp Gold, a widely used network monitoring and management solution. The flaw is a path traversal vulnerability (CWE-22) located in the WhatsUp.ExportUtilities.Export.GetFileWithoutZip function. This vulnerability allows an unauthenticated attacker to manipulate file path inputs to escape restricted directories and execute arbitrary commands on the underlying system. The commands execute with the privileges of the iisapppool\nmconsole account, which typically has significant permissions on the host, potentially allowing full system compromise. The vulnerability affects WhatsUp Gold versions prior to 2023.1.3, with 2023.1.0 explicitly mentioned as vulnerable. The CVSS v3.1 base score is 9.8, reflecting the ease of exploitation (network vector, no privileges or user interaction required), and the severe impact on confidentiality, integrity, and availability. While no public exploits have been observed yet, the critical nature and exposure of this vulnerability make it a prime target for attackers. The lack of authentication requirement means any attacker with network access to the affected service can attempt exploitation, increasing the attack surface. This vulnerability could lead to unauthorized data access, system takeover, lateral movement within networks, and disruption of network monitoring capabilities.
Potential Impact
For European organizations, the impact of CVE-2024-4885 is substantial. WhatsUp Gold is commonly used in enterprise environments for network monitoring, alerting, and management, often integrated into critical IT infrastructure. Exploitation could lead to unauthorized access to sensitive network data, disruption of monitoring services, and full system compromise, potentially affecting business continuity and data integrity. Critical sectors such as finance, healthcare, telecommunications, and government agencies relying on WhatsUp Gold for network visibility are particularly at risk. The ability to execute code remotely without authentication means attackers can rapidly compromise systems, potentially deploying ransomware or conducting espionage. Additionally, compromised monitoring tools can be used to mask malicious activities, complicating incident detection and response. The widespread use of WhatsUp Gold in European enterprises and public sector organizations amplifies the threat, making timely mitigation crucial to prevent large-scale operational disruptions and data breaches.
Mitigation Recommendations
1. Immediate upgrade to WhatsUp Gold version 2023.1.3 or later, where the vulnerability is patched, is the most effective mitigation. 2. If patching is not immediately possible, restrict network access to the WhatsUp Gold management interfaces using firewalls or network segmentation to limit exposure to trusted administrators only. 3. Implement strict access controls and monitoring on the iisapppool\nmconsole account to detect unusual activity. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the vulnerable function. 5. Conduct thorough network and host-based intrusion detection to identify exploitation attempts or suspicious command execution. 6. Review and harden the configuration of WhatsUp Gold, disabling unnecessary services or features that could be exploited. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8. Monitor vendor advisories and threat intelligence feeds for emerging exploit information and apply updates promptly.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2024-4885: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Progress Software Corporation WhatsUp Gold
Description
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.
AI-Powered Analysis
Technical Analysis
CVE-2024-4885 is a critical remote code execution vulnerability identified in Progress Software Corporation's WhatsUp Gold, a widely used network monitoring and management solution. The flaw is a path traversal vulnerability (CWE-22) located in the WhatsUp.ExportUtilities.Export.GetFileWithoutZip function. This vulnerability allows an unauthenticated attacker to manipulate file path inputs to escape restricted directories and execute arbitrary commands on the underlying system. The commands execute with the privileges of the iisapppool\nmconsole account, which typically has significant permissions on the host, potentially allowing full system compromise. The vulnerability affects WhatsUp Gold versions prior to 2023.1.3, with 2023.1.0 explicitly mentioned as vulnerable. The CVSS v3.1 base score is 9.8, reflecting the ease of exploitation (network vector, no privileges or user interaction required), and the severe impact on confidentiality, integrity, and availability. While no public exploits have been observed yet, the critical nature and exposure of this vulnerability make it a prime target for attackers. The lack of authentication requirement means any attacker with network access to the affected service can attempt exploitation, increasing the attack surface. This vulnerability could lead to unauthorized data access, system takeover, lateral movement within networks, and disruption of network monitoring capabilities.
Potential Impact
For European organizations, the impact of CVE-2024-4885 is substantial. WhatsUp Gold is commonly used in enterprise environments for network monitoring, alerting, and management, often integrated into critical IT infrastructure. Exploitation could lead to unauthorized access to sensitive network data, disruption of monitoring services, and full system compromise, potentially affecting business continuity and data integrity. Critical sectors such as finance, healthcare, telecommunications, and government agencies relying on WhatsUp Gold for network visibility are particularly at risk. The ability to execute code remotely without authentication means attackers can rapidly compromise systems, potentially deploying ransomware or conducting espionage. Additionally, compromised monitoring tools can be used to mask malicious activities, complicating incident detection and response. The widespread use of WhatsUp Gold in European enterprises and public sector organizations amplifies the threat, making timely mitigation crucial to prevent large-scale operational disruptions and data breaches.
Mitigation Recommendations
1. Immediate upgrade to WhatsUp Gold version 2023.1.3 or later, where the vulnerability is patched, is the most effective mitigation. 2. If patching is not immediately possible, restrict network access to the WhatsUp Gold management interfaces using firewalls or network segmentation to limit exposure to trusted administrators only. 3. Implement strict access controls and monitoring on the iisapppool\nmconsole account to detect unusual activity. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the vulnerable function. 5. Conduct thorough network and host-based intrusion detection to identify exploitation attempts or suspicious command execution. 6. Review and harden the configuration of WhatsUp Gold, disabling unnecessary services or features that could be exploited. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8. Monitor vendor advisories and threat intelligence feeds for emerging exploit information and apply updates promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ProgressSoftware
- Date Reserved
- 2024-05-14T18:28:11.852Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f7d9b5247d717aace26bb4
Added to database: 10/21/2025, 7:06:29 PM
Last enriched: 10/21/2025, 7:25:41 PM
Last updated: 10/30/2025, 12:00:59 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownCVE-2025-12466: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Drupal Simple OAuth (OAuth2) & OpenID Connect
UnknownCVE-2025-12083: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal CivicTheme Design System
UnknownCVE-2025-12082: CWE-863 Incorrect Authorization in Drupal CivicTheme Design System
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.