Critical RCE Flaw Discovered in WhatsUp Gold (CVE-2024–8785) — Update Immediately! ️

9 hours ago 6
BOOK THIS SPACE FOR AD
ARTICLE AD

WIRE TOR - The Ethical Hacking Services

🚨 Critical RCE Flaw Discovered in WhatsUp Gold (CVE-2024–8785) — Update Immediately! 🛡️ WIRE TOR — The Ethical Hacking Services 850 followers December 4, 2024 A new exploit has been released for critical remote code execution (RCE) vulnerability in WhatsUp Gold, putting many systems at immediate risk. Identified as CVE-2024–8785 with a CVSS score of 9.8, administrators need to update their systems right away to avoid compromise. 🔍 What’s the Risk? The issue lies in the NmAPI.exe process

A new exploit has been released for critical remote code execution (RCE) vulnerability in WhatsUp Gold, putting many systems at immediate risk. Identified as CVE-2024–8785 with a CVSS score of 9.8, administrators need to update their systems right away to avoid compromise.

The issue lies in the NmAPI.exe process in WhatsUp Gold versions 2023.1.0 and older versions before 24.0.1. This process manages the network through an API interface, handling external requests.

Due to weak validation checks, attackers can send malicious requests to the API, allowing them to:

Modify important Windows registry settings to redirect configuration file paths.Execute external code remotely by tricking the system into reading from attacker-controlled locations.Create persistence mechanisms by altering startup configurations, ensuring their code runs after the system restarts.The exploit triggers via the UpdateFailoverRegistryValues operation at: net.tcp://<target-host>:9643.The attacker then changes registry paths like: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ipswitch\.When the service restarts, it reads files from the attacker’s server, executing unauthorized commands.

This exploit works without authentication, making it even more dangerous as it can be accessed from anywhere on the network.

Admins should upgrade to version 24.0.1 or newer as soon as possible.

🛠️ The update addresses CVE-2024–8785 and other security vulnerabilities to protect against potential attacks.

This isn’t the first time attackers have targeted WhatsUp Gold:

August 2024: Hackers used similar flaws to infiltrate corporate networks.September 2024: Malicious actors exploited vulnerabilities to hijack administrator accounts.

Given its history, updating your system is essential to prevent unauthorized access and avoid security breaches.

Protect your business from evolving threats with expert penetration testing services: 🛡️ Web Application Security 🌐 Network Security Assessments 📱 Mobile App Testing ☁️ Cloud Infrastructure Reviews 🔧 IoT Security Checks 🔍 Social Engineering Simulations

💡 Stay secure and minimize risks with tailored solutions for your organization.

📢 Stay Updated: Follow Us for Security News and Services

🚀 Secure Before You’re Exposed!

Read Entire Article