In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM.
The vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients.
Metrics
Affected Vendors & Products
References
History
Wed, 21 Aug 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Progress
Progress whatsup Gold |
|
CPEs | cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:* cpe:2.3:a:progress:whatsup_gold:23.1.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Progress
Progress whatsup Gold |

Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2024-08-01T20:55:10.382Z
Reserved: 2024-05-16T15:59:55.464Z
Link: CVE-2024-5016

Updated: 2024-08-01T20:55:10.382Z

Status : Modified
Published: 2024-06-25T21:16:01.163
Modified: 2024-11-21T09:46:47.320
Link: CVE-2024-5016

No data.