First published: Wed May 11 2022(Updated: )
In Progress Ipswitch WhatsUp Gold 17.0.0 through 21.1.1, and 22.0.0, it is possible for an authenticated user to invoke an API transaction that would allow them to read sensitive operating-system attributes from a host that is accessible by the WhatsUp Gold system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch WhatsUp Gold | >=17.0.0<=21.1.1 | |
Ipswitch WhatsUp Gold | =22.0.0 | |
Progress WhatsUp Gold | >=17.0.0<=21.1.1 | |
Progress WhatsUp Gold | =22.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29848 is a vulnerability in Ipswitch WhatsUp Gold versions 17.0.0 through 21.1.1 and 22.0.0 that allows authenticated users to read sensitive operating system attributes from a host accessible by the WhatsUp Gold system.
Ipswitch WhatsUp Gold versions 17.0.0 through 21.1.1 and version 22.0.0 are affected by CVE-2022-29848.
CVE-2022-29848 has a severity level of medium (6.5).
An authenticated user can exploit CVE-2022-29848 by invoking an API transaction that allows them to read sensitive operating system attributes from a host accessible by the WhatsUp Gold system.
Yes, the following references provide more information about CVE-2022-29848: - [Progress Community Article](https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022) - [Progress Network Monitoring](https://www.progress.com/network-monitoring)