First published: Mon Dec 02 2024(Updated: )
In WhatsUp Gold versions released before 2024.0.1, a remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Software WhatsUp Gold | <24.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8785 is classified as a high-severity vulnerability due to the potential for remote unauthenticated attacks.
To fix CVE-2024-8785, upgrade WhatsUp Gold to version 2024.0.1 or later.
WhatsUp Gold versions prior to 2024.0.1 are affected by CVE-2024-8785.
CVE-2024-8785 allows remote unauthenticated attackers to create or modify registry values.
As of now, there is no publicly reported exploit specifically targeting CVE-2024-8785.