Lucene search

K
vulnrichmentProgressSoftwareVULNRICHMENT:CVE-2024-5016
HistoryJun 25, 2024 - 8:23 p.m.

CVE-2024-5016 WhatsUp Gold OnMessage Deserialization of Untrusted Data Remote Code Execution Vulnerability

2024-06-2520:23:46
CWE-502
ProgressSoftware
github.com
whatsup gold
remote code execution
vulnerability
distributed edition
deserialization
untrusted data
system
message processing

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM. 
The vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients.

CNA Affected

[
  {
    "vendor": "Progress Software Corporation",
    "modules": [
      "API Endpoint"
    ],
    "product": "WhatsUp Gold",
    "versions": [
      {
        "status": "affected",
        "version": "2023.1.0",
        "lessThan": "2023.1.3",
        "versionType": "semver"
      }
    ],
    "platforms": [
      "Windows"
    ],
    "defaultStatus": "affected"
  }
]

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

7.5 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

9.1%

Related for VULNRICHMENT:CVE-2024-5016