First published: Wed Jan 24 2018(Updated: )
An issue was discovered in Ipswitch WhatsUp Gold before 2017 Plus SP1 (17.1.1). Remote clients can take advantage of a misconfiguration in the TFTP server that could allow attackers to execute arbitrary commands on the TFTP server via unspecified vectors.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WhatsUp Gold | <17.1.1 | |
Progress WhatsUp Gold | <17.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-5777 is critical with a score of 9.8.
Remote clients can exploit CVE-2018-5777 by taking advantage of a misconfiguration in the TFTP server.
If attackers exploit CVE-2018-5777, they can execute arbitrary commands on the TFTP server.
Ipswitch WhatsUp Gold versions up to and exclusive of 17.1.1 are affected by CVE-2018-5777.
You can find more information about CVE-2018-5777 in the release notes for Ipswitch WhatsUp Gold 2017 Plus SP1.