In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM.
The vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients.
Metrics
Affected Vendors & Products
References
History
Wed, 21 Aug 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Progress
Progress whatsup Gold |
|
CPEs | cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:* cpe:2.3:a:progress:whatsup_gold:23.1.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Progress
Progress whatsup Gold |
MITRE
Status: PUBLISHED
Assigner: ProgressSoftware
Published: 2024-06-25T20:23:46.895Z
Updated: 2024-08-01T20:55:10.382Z
Reserved: 2024-05-16T15:59:55.464Z
Link: CVE-2024-5016
Vulnrichment
Updated: 2024-08-01T20:55:10.382Z
NVD
Status : Modified
Published: 2024-06-25T21:16:01.163
Modified: 2024-11-21T09:46:47.320
Link: CVE-2024-5016
Redhat
No data.