Patch now! Exploit for critical vulnerability in Whatsup Gold in circulation

The Whatsup Gold monitoring software is vulnerable. Security researchers have now discovered an exploit for malicious code attacks. A patch is available.

listen Print view

(Image: Photon photo/Shutterstock.com)

2 min. read

Admins should quickly protect their instances with Whatsup Gold against possible attacks. A"critical" security vulnerability has been known since September of this year. A security update has also been available since then. As exploit code for the vulnerability is now circulating, attacks could be imminent.

As security researchers from Tenable explain in a report , remote attackers can exploit the vulnerability (CVE-2024-8785"critical") without authentication. According to them, the security problem can be found in the network management API NmAPI.exe, which is accessible via the network. Because input is not sufficiently checked, attackers can use crafted requests there.

If this works, they can overwrite entries in the Windows registry so that the configuration settings of the monitoring software are loaded from a share controlled by attackers, for example. This can lead to the execution of malicious code, which usually results in the complete compromise of systems.

A security patch has been available since September 2024. In a warning message, the developers state that Whatsup Gold 24.0.1 is protected against the described attack. All previous versions are said to be vulnerable. The developers have also closed five other vulnerabilities.

Videos by heise

If attackers successfully exploit these vulnerabilities, they can, among other things, execute malicious code in the context of the service account (CVE-2024-46909"critical") or elevate themselves to admin (CVE-2024-46908"high").

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.