In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.
https://www.securityweek.com/exploitation-long-known-for-most-of-cisas-latest-kev-additions/
https://www.infosecurity-magazine.com/news/cisa-govt-patch-exploited-cisco/
https://thehackernews.com/2025/03/cisco-hitachi-microsoft-and-progress.html
https://thehackernews.com/2024/09/progress-whatsup-gold-exploited-just.html
Published: 2024-06-25
Updated: 2025-03-10
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94278
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest