Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4885: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Progress Software Corporation WhatsUp Gold

0
Critical
VulnerabilityCVE-2024-4885cvecve-2024-4885cwe-22
Published: Tue Jun 25 2024 (06/25/2024, 19:48:15 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software Corporation
Product: WhatsUp Gold

Description

In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.  The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 22:32:59 UTC

Technical Analysis

CVE-2024-4885 is a critical security vulnerability identified in Progress Software Corporation's WhatsUp Gold network monitoring product, specifically affecting version 2023.1.0 and earlier versions prior to 2023.1.3. The vulnerability is classified under CWE-22, indicating improper limitation of a pathname to a restricted directory, commonly known as a path traversal flaw. The issue resides in the WhatsUp.ExportUtilities.Export.GetFileWithoutZip function, which fails to properly validate or restrict file path inputs. This flaw enables an unauthenticated remote attacker to craft malicious requests that exploit the path traversal to execute arbitrary commands on the underlying system. The commands run with the privileges of the iisapppool\nmconsole account, which typically has significant permissions on the Windows server hosting WhatsUp Gold, including the ability to execute code and potentially escalate privileges further. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with full impact on confidentiality, integrity, and availability of affected systems. Although no public exploits or active exploitation in the wild have been reported at the time of publication, the vulnerability's characteristics suggest it could be weaponized quickly. The flaw could allow attackers to compromise network monitoring infrastructure, manipulate monitoring data, disrupt network visibility, and use the compromised host as a pivot point for further attacks within an enterprise environment.

Potential Impact

The impact of CVE-2024-4885 on organizations worldwide is severe. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, leading to full system compromise of the WhatsUp Gold server. This can result in unauthorized access to sensitive network monitoring data, manipulation or deletion of logs, disruption of network monitoring services, and potential lateral movement within the network. Given WhatsUp Gold's role in monitoring critical IT infrastructure, such compromise can blind security teams to ongoing attacks or outages, increasing the risk of prolonged undetected intrusions. The elevated privileges of the exploited process (iisapppool\nmconsole) can enable attackers to install persistent backdoors, exfiltrate data, or launch further attacks against internal systems. Enterprises relying on WhatsUp Gold for operational continuity, especially in sectors like finance, healthcare, telecommunications, and government, face heightened risks of operational disruption and data breaches. The critical severity and ease of exploitation underscore the urgency for remediation to prevent potential widespread impact.

Mitigation Recommendations

To mitigate CVE-2024-4885, organizations should immediately upgrade WhatsUp Gold to version 2023.1.3 or later, where the vulnerability has been addressed. If patching is not immediately feasible, implement network-level controls to restrict access to the WhatsUp Gold management interfaces, limiting exposure to trusted IP addresses only. Employ web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the vulnerable GetFileWithoutZip function. Monitor logs for unusual or suspicious requests that may indicate exploitation attempts. Additionally, review and harden the permissions of the iisapppool\nmconsole account to the minimum necessary privileges to reduce potential impact. Conduct thorough network segmentation to isolate monitoring infrastructure from general user networks and external internet access. Finally, maintain up-to-date backups of critical monitoring configurations and data to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ProgressSoftware
Date Reserved
2024-05-14T18:28:11.852Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b5247d717aace26bb4

Added to database: 10/21/2025, 7:06:29 PM

Last enriched: 2/27/2026, 10:32:59 PM

Last updated: 3/23/2026, 7:34:27 AM

Views: 104

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses