Description
In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM. 
The vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients.
Published: 2024-06-25
Score: 7.2 High
EPSS: 6.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-46288 In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM.  The vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients.
History

Wed, 21 Aug 2024 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Progress
Progress whatsup Gold
CPEs cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:whatsup_gold:23.1.0:*:*:*:*:*:*:*
Vendors & Products Progress
Progress whatsup Gold

Subscriptions

Progress Whatsup Gold
cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published:

Updated: 2024-08-01T20:55:10.382Z

Reserved: 2024-05-16T15:59:55.464Z

Link: CVE-2024-5016

cve-icon Vulnrichment

Updated: 2024-08-01T20:55:10.382Z

cve-icon NVD

Status : Modified

Published: 2024-06-25T21:16:01.163

Modified: 2024-11-21T09:46:47.320

Link: CVE-2024-5016

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses