Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6670: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Progress Software Corporation WhatsUp Gold

0
Critical
VulnerabilityCVE-2024-6670cvecve-2024-6670cwe-89
Published: Thu Aug 29 2024 (08/29/2024, 22:04:41 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software Corporation
Product: WhatsUp Gold

Description

In WhatsUp Gold versions released before 2024.0.0, a SQL Injection vulnerability allows an unauthenticated attacker to retrieve the users encrypted password.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:49:45 UTC

Technical Analysis

CVE-2024-6670 is a critical SQL Injection vulnerability identified in Progress Software Corporation's WhatsUp Gold, a widely used network monitoring and management solution. The vulnerability affects versions released before 2024.0.0, including version 2023.1.0. The root cause is improper neutralization of special elements in SQL commands (CWE-89), which allows an unauthenticated attacker to inject malicious SQL code. This injection flaw enables the attacker to retrieve encrypted user passwords stored in the database, potentially leading to further compromise if these credentials are decrypted or reused. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with attack vector being network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits have been observed in the wild yet, the exposure of encrypted passwords could facilitate lateral movement, privilege escalation, and data breaches. WhatsUp Gold is often deployed in enterprise environments for network visibility and management, making this vulnerability a significant risk to operational continuity and sensitive data protection. The lack of an official patch at the time of publication necessitates immediate mitigation efforts by affected organizations.

Potential Impact

The impact of CVE-2024-6670 is severe for organizations worldwide using WhatsUp Gold for network monitoring and management. Successful exploitation can lead to unauthorized disclosure of encrypted user passwords, which may be decrypted or used in credential stuffing attacks, compromising user accounts and administrative access. This can result in full system compromise, allowing attackers to manipulate monitoring data, disrupt network operations, or pivot to other internal systems. The integrity of network monitoring data may be undermined, leading to undetected malicious activity or false alerts. Availability may also be affected if attackers disrupt the monitoring service or use the access to launch denial-of-service attacks. Enterprises relying on WhatsUp Gold for critical infrastructure monitoring, including telecommunications, finance, healthcare, and government sectors, face heightened risks of operational disruption and data breaches. The vulnerability's ease of exploitation without authentication increases the likelihood of automated attacks and widespread exploitation once public exploit code becomes available.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to WhatsUp Gold interfaces by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting WhatsUp Gold. 3. Monitor database query logs and application logs for unusual or suspicious SQL commands indicative of injection attempts. 4. Enforce the principle of least privilege on database accounts used by WhatsUp Gold to minimize potential damage from compromised credentials. 5. Disable or restrict any unnecessary features or interfaces that could be exploited to inject SQL commands. 6. Regularly back up WhatsUp Gold configurations and data to enable recovery in case of compromise. 7. Stay alert for official patches or updates from Progress Software Corporation and apply them promptly once available. 8. Conduct internal penetration testing and vulnerability assessments focusing on SQL injection vectors in WhatsUp Gold deployments. 9. Educate IT and security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ProgressSoftware
Date Reserved
2024-07-10T19:45:27.069Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b7247d717aace26c80

Added to database: 10/21/2025, 7:06:31 PM

Last enriched: 2/28/2026, 3:49:45 AM

Last updated: 3/25/2026, 5:43:26 AM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses