Skip to content

Commit 9bb66e3

Browse files
TWangmoJadonWill
andauthored
20241029001-Progress-WhatsUp-Critical-Update (#1069)
* 20241021003-CISA-NEW-ICS-Advisories * Format markdown docs * Update 20241021003 Included CISA references * Format markdown docs * 20241029001-Progress-WhatsUp-Critical-Update * Format markdown docs * Update 20241029001 Changed recommendation from "one month" to "48 hours" to align with E8 compliance. * Format markdown docs --------- Co-authored-by: TWangmo <[email protected]> Co-authored-by: JadonWill <[email protected]> Co-authored-by: JadonWill <[email protected]>
1 parent bcd2f88 commit 9bb66e3

File tree

1 file changed

+25
-0
lines changed

1 file changed

+25
-0
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
# Progress WhatsUp Critical Update - 20241029001
2+
3+
## Overview
4+
5+
The WA SOC has been made aware about a critical vulnerability in certain WhatsUp Gold versions, having an Authentication Bypass issue which allows an attacker to obtain encrypted user credentials.
6+
7+
## What is vulnerable?
8+
9+
| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
10+
| ------------------- | ---------------------------- | --------------------------------------------------------------- | ---- | ------------ |
11+
| WhatsUp Gold | All versions before 2024.0.0 | [CVE-2024-7763](https://nvd.nist.gov/vuln/detail/CVE-2024-7763) | 9.8 | **Critical** |
12+
13+
## What has been observed?
14+
15+
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
16+
17+
## Recommendation
18+
19+
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours* (refer [Patch Management](../guidelines/patch-management.md)):
20+
21+
- Progress: <https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-August-2024>
22+
23+
## Additional References
24+
25+
- SecurityOnlie: <https://securityonline.info/whatsup-gold-users-beware-critical-authentication-bypass-flaw-exposed-cve-2024-7763-cvss-9-8/>

0 commit comments

Comments
 (0)