In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM. 
The vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-46288 In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM.  The vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 Aug 2024 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Progress
Progress whatsup Gold
CPEs cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
cpe:2.3:a:progress:whatsup_gold:23.1.0:*:*:*:*:*:*:*
Vendors & Products Progress
Progress whatsup Gold

cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published:

Updated: 2024-08-01T20:55:10.382Z

Reserved: 2024-05-16T15:59:55.464Z

Link: CVE-2024-5016

cve-icon Vulnrichment

Updated: 2024-08-01T20:55:10.382Z

cve-icon NVD

Status : Modified

Published: 2024-06-25T21:16:01.163

Modified: 2024-11-21T09:46:47.320

Link: CVE-2024-5016

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.