Critical Progress WhatsUp RCE flaw now under active exploitation

Share:

Threat actors are actively attempting to exploit a recently fixed  Progress WhatsUp Gold remote code execution vulnerability on exposed servers for initial access to corporate networks.

The vulnerability leveraged in these attacks is CVE-2024-4885, a critical-severity (CVSS v3 score: 9.8) unauthenticated remote code execution flaw impacting Progress WhatsUp Gold 23.1.2 and older.

Proof-of-concept (PoC) exploits for CVE-2024-4885 are publicly available that target exposed WhatsUp Gold ‘/NmAPI/RecurringReport’ endpoints.

Threat monitoring organization Shadowserver Foundation reports that the attempts started on August 1, 2024, coming from six distinct IP addresses.

 

The CVE-2024-4885 RCE

Progress WhatsUp Gold is a network monitoring application that allows you to track the uptime and availability of servers and services running on them. However, as with any software, it should only be accessible internally, through a VPN, or via trusted IP addresses.

On June 25, 2024, Progress released a security bulletin warning about fifteen high and critical-severity bugs, including CVE-2024-4885, a 9.8-rated critical RCE flaw. Progress urged users to upgrade to the latest version, 23.1.3, to resolve the vulnerabilities.

CVE-2024-4885 is a remote code execution flaw in the ‘WhatsUp.ExportUtilities.Export. GetFileWithoutZip’ function, allowing unauthenticated attackers to execute commands with the privileges of the ‘iisapppool\\nmconsole’ user.

This is not an admin user but still has elevated permissions within the context of WhatsUp Gold. It can execute code on the server and even access the underlying system.

The vendor’s recommendations for those unable to upgrade to 23.1.3 were to monitor exploitation attempts at the’/NmAPI/RecurringReport’ endpoint and implement firewall rules to restrict access to it only to trusted IP addresses on ports 9642 and 9643.

The flaw was discovered by security researcher Sina Kheirkhah, who published a detailed technical write-up on his blog, including a proof-of-concept exploit.

The exploit sends a ‘TestRecurringReport’ request to an exposed WhatsUp Gold reporting endpoint that contains a specially crafted configuration. This configuration includes the URL to an attacker-controlled web server and the user ID the targeted server should respond with.

When the targeted server responds to the attacker’s server, it will include the user name and encrypted password associated with the user ID.

Kheirkhah’s exploit uses this information to make and receive further requests and resposnes with the targeted server to ultimately cause a file to be written on the server, which is then launched remotely for code execution, as illustrated below.

 

As the final payload in the exploit is delivered from attacker-controlled servers, it is unknown at this time what payloads are being created on targeted servers. However, similar activity in the past created webshells on the targeted devices for easier access and persistence.

Given the active exploitation status, WhatsUp Gold admins should apply the latest security updates or mitigations and continue monitoring for suspicious activity.

The WhatsUp Gold server should also be placed behind a firewall and accessible only internally or by trusted IP addresses.

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
10:13 pm, Jun 21, 2025
weather icon 26°C
L: 24° | H: 27°
scattered clouds
Humidity: 51 %
Pressure: 1013 mb
Wind: 11 mph ESE
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 44%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:21 pm
DailyHourly
Daily ForecastHourly Forecast
Tomorrow 10:00 pm
weather icon
24° | 27°°C 0.25 mm 25% 16 mph 64 % 1014 mb 0 mm/h
Mon Jun 23 10:00 pm
weather icon
15° | 23°°C 0.2 mm 20% 15 mph 80 % 1016 mb 0 mm/h
Tue Jun 24 10:00 pm
weather icon
13° | 25°°C 0 mm 0% 14 mph 80 % 1016 mb 0 mm/h
Wed Jun 25 10:00 pm
weather icon
16° | 28°°C 0.21 mm 21% 10 mph 85 % 1014 mb 0 mm/h
Thu Jun 26 10:00 pm
weather icon
16° | 20°°C 1 mm 100% 12 mph 95 % 1015 mb 0 mm/h
Tomorrow 1:00 am
weather icon
21° | 25°°C 0.2 mm 20% 8 mph 53 % 1013 mb 0 mm/h
Tomorrow 4:00 am
weather icon
17° | 20°°C 0.25 mm 25% 9 mph 64 % 1013 mb 0 mm/h
Tomorrow 7:00 am
weather icon
17° | 17°°C 0 mm 0% 10 mph 64 % 1014 mb 0 mm/h
Tomorrow 10:00 am
weather icon
22° | 22°°C 0 mm 0% 12 mph 49 % 1014 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
26° | 26°°C 0 mm 0% 14 mph 34 % 1013 mb 0 mm/h
Tomorrow 4:00 pm
weather icon
24° | 24°°C 0 mm 0% 16 mph 41 % 1012 mb 0 mm/h
Tomorrow 7:00 pm
weather icon
23° | 23°°C 0 mm 0% 14 mph 51 % 1012 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
19° | 19°°C 0 mm 0% 10 mph 59 % 1013 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€89,129.29
-0.83%
Ethereum(ETH)
€2,084.33
-0.86%
Tether(USDT)
€0.87
0.01%
XRP(XRP)
€1.81
-1.97%
Solana(SOL)
€120.12
-1.64%
USDC(USDC)
€0.87
0.00%
Dogecoin(DOGE)
€0.137588
-3.02%
Shiba Inu(SHIB)
€0.000010
-2.96%
Pepe(PEPE)
€0.000009
-2.17%
Peanut the Squirrel(PNUT)
€0.218233
13.10%
Scroll to Top