CVE-2024-8785

In WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\.
Configurations

Configuration 1 (hide)

cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*

History

09 Dec 2024, 20:25

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*
First Time Progress whatsup Gold
Progress
References () https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024 - () https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024 - Vendor Advisory
References () https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html - () https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html - Release Notes
References () https://www.progress.com/network-monitoring - () https://www.progress.com/network-monitoring - Product

Information

Published : 2024-12-02 15:15

Updated : 2024-12-09 20:25


NVD link : CVE-2024-8785

Mitre link : CVE-2024-8785

CVE.ORG link : CVE-2024-8785


JSON object : View

Products Affected

progress

  • whatsup_gold
CWE
CWE-648

Incorrect Use of Privileged APIs

NVD-CWE-noinfo