In WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Dec 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:* |
Mon, 02 Dec 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Progress
Progress whatsup Gold |
|
CPEs | cpe:2.3:a:progress:whatsup_gold:-:*:*:*:*:*:*:* | |
Vendors & Products |
Progress
Progress whatsup Gold |
|
Metrics |
ssvc
|
Mon, 02 Dec 2024 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\. | |
Title | WhatsUp Gold Registry Overwrite Remote Code Execution Vulnerability | |
Weaknesses | CWE-648 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: ProgressSoftware
Published:
Updated: 2024-12-02T15:30:19.766Z
Reserved: 2024-09-13T14:50:10.817Z
Link: CVE-2024-8785

Updated: 2024-12-02T15:22:54.729Z

Status : Analyzed
Published: 2024-12-02T15:15:12.380
Modified: 2024-12-09T20:25:23.770
Link: CVE-2024-8785

No data.