Date of Disclosure: September 24, 2024
CVE-2024-8785 is a flaw in Progress WhatsUp Gold versions released before 24.0.1 that allows a remote unauthenticated attacker to leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\.
The initial disclosure of CVE-2024-8785 occurred when Progress Software released a security bulletin on September 24, 2024, predating the CVE assignment by a few months. There is an exploit for this vulnerability, as acknowledged by Progress Software after it was reported by Tenable. However, we currently do not have access to the exploit itself. Tenable has published a detailed writeup that explains how the vulnerability might be exploited.
Field |
Details |
CVE-ID |
CVE-2024-8785 – CVSS 9.8 (critical) – assigned by Progress Software Corporation |
Vulnerability Description |
In WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\. |
Date of Disclosure |
September 24, 2024 |
Affected Assets |
NmAPI.exe in Progress WhatsUp Gold |
Vulnerable Software Versions |
Versions before 2024.0.1 |
PoC Available? |
Progress Software acknowledged the existence of public exploit, and Tenable published a writeup detailing how the exploit works. |
Exploitation Status |
At the time of writing, this CVE did not appear on CISA KEV and was not observed in GreyNoise. |
Patch Status |
Progress Software released a security bulletin in September with instructions for upgrading WhatsUp Gold. |
Censys Perspective
At the time of writing, Censys observed 1,219 exposed WhatsUp Gold instances online. A large proportion of these (51%) are geolocated in Brazil. Censys observed about 18% of the exposed instances to be associated with Kesley Matias Da Silva (ASN 269393), a telecommunications provider. Note that not all of these are necessarily vulnerable, as specific versions are not always available.
Map of Exposed WhatsUp Gold instances:
Censys Search Query:
services.software: (vendor="Progress" and product="WhatsUp Gold")
Censys ASM Query:
host.services.software.vendor="Progress" and host.services.software.product="WhatsUp Gold"
References