First published: Wed May 11 2022(Updated: )
In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WhatsUp Gold | >=21.0.0<=21.1.1 | |
Ipswitch WhatsUp Gold | =22.0.0 | |
Progress WhatsUp Gold | >=21.0.0<=21.1.1 | |
Progress WhatsUp Gold | =22.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29847 is a vulnerability in Ipswitch WhatsUp Gold 21.0.0 through 21.1.1 and 22.0.0 that allows an unauthenticated attacker to relay encrypted user credentials to an arbitrary host.
CVE-2022-29847 allows an unauthenticated attacker to relay encrypted user credentials in Ipswitch WhatsUp Gold to an arbitrary host.
CVE-2022-29847 has a severity rating of 7.5 (high).
To fix CVE-2022-29847, it is recommended to apply the latest patches and updates provided by Ipswitch WhatsUp Gold.
More information about CVE-2022-29847 can be found in the official advisory from Ipswitch and the Progress community website.