Summary: Progress Software has identified a critical vulnerability (CVE-2024-7763) in its WhatsUp Gold network monitoring solution, allowing unauthorized access to user credentials and posing significant risks to network security. This flaw, along with others, highlights the urgent need for users to upgrade to the latest version to mitigate potential cyberattacks.
Threat Actor: Cybercriminals | cybercriminals
Victim: Progress Software | Progress Software
Key Point :
- Vulnerability CVE-2024-7763 allows attackers to bypass authentication and access encrypted user credentials.
- All versions of WhatsUp Gold released before 2024.0.0 are affected by this critical flaw.
- Progress Software recommends users upgrade to version 2024.0.0 or newer to protect against these vulnerabilities.
- Other high-risk vulnerabilities in WhatsUp Gold include CVE-2024-6670 and CVE-2024-6671, which enable SQL Injection attacks.
- Active exploitation of these vulnerabilities has been reported, emphasizing the urgency for users to take action.

Progress Software has disclosed a severe new vulnerability in its popular network monitoring solution, WhatsUp Gold, that exposes organizations to potential cyberattacks by allowing unauthorized access to user credentials. The flaw, tracked as CVE-2024-7763 and rated CVSS 9.8, enables attackers to bypass authentication controls and obtain encrypted credentials, posing a critical risk to any network using affected versions.
WhatsUp Gold, known for its comprehensive network visibility features, is widely deployed in corporate environments to monitor and manage network devices, servers, virtual machines, and more. Unfortunately, this vulnerability affects all versions released before 2024.0.0. In an update on October 24, Progress warned users, “an Authentication Bypass issue exists which allows an attacker to obtain encrypted user credentials,” thereby jeopardizing the security of sensitive network operations.
Attackers exploiting this vulnerability gain access to encrypted user credentials, potentially opening the door to further unauthorized access. For administrators seeking signs of compromise, the Settings > Actions and Alerts > Alert Center Libraries > Threshold tab should be reviewed for unusual entries in the “Name” column.
CVE-2024-7763 joins a list of high-risk vulnerabilities in WhatsUp Gold revealed in Progress’s August security bulletin. Two other vulnerabilities, CVE-2024-6670 and CVE-2024-6671, also carry a CVSS score of 9.8 and enable SQL Injection attacks that could compromise encrypted passwords in single-user configurations. A third flaw, CVE-2024-6672, allows for privilege escalation by modifying a privileged user’s password through SQL injection, granting unauthorized access to elevated controls.
Notably, two vulnerabilities CVE-2024-6670 and CVE-2024-6671 have been exploited actively, with cybercriminals targeting vulnerable versions in the wild.
To protect against these vulnerabilities, Progress strongly advises WhatsUp Gold users to upgrade to the latest release, version 2024.0.0 or newer.
Related Posts:
Views: 0