First published: Wed May 11 2022(Updated: )
In Progress Ipswitch WhatsUp Gold 16.1 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to obtain the WhatsUp Gold installation serial number.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WhatsUp Gold | >=16.1<=21.1.1 | |
Ipswitch WhatsUp Gold | =22.0.0 | |
Progress WhatsUp Gold | >=16.1<=21.1.1 | |
Progress WhatsUp Gold | =22.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Ipswitch WhatsUp Gold vulnerability is CVE-2022-29846.
CVE-2022-29846 has a severity level of medium (5.3).
An unauthenticated attacker can exploit CVE-2022-29846 to obtain the WhatsUp Gold installation serial number.
Ipswitch WhatsUp Gold versions 16.1 through 21.1.1, and version 22.0.0 are affected by CVE-2022-29846.
You can find more information about CVE-2022-29846 in the references provided: [link1](https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022) and [link2](https://www.progress.com/network-monitoring).