{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T09:03:02.562","vulnerabilities":[{"cve":{"id":"CVE-2024-5016","sourceIdentifier":"security@progress.com","published":"2024-06-25T21:16:01.163","lastModified":"2024-11-21T09:46:47.320","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In WhatsUp Gold versions released before 2023.1.3, Distributed Edition installations can be exploited by using a deserialization tool to achieve a Remote Code Execution as SYSTEM. \nThe vulnerability exists in the main message processing routines NmDistributed.DistributedServiceBehavior.OnMessage for server and NmDistributed.DistributedClient.OnMessage for clients."},{"lang":"es","value":"En las versiones de WhatsUp Gold lanzadas antes de 2023.1.3, las instalaciones de Distributed Edition se pueden explotar mediante el uso de una herramienta de deserialización para lograr una ejecución remota de código como SYSTEM. La vulnerabilidad existe en las rutinas principales de procesamiento de mensajes NmDistributed.DistributedServiceBehavior.OnMessage para el servidor y NmDistributed.DistributedClient.OnMessage para los clientes."}],"metrics":{"cvssMetricV31":[{"source":"security@progress.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@progress.com","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*","versionEndExcluding":"23.1.0","matchCriteriaId":"5D27D3E3-A9E8-493A-8D4A-51ED537ABC7D"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:whatsup_gold:23.1.0:*:*:*:*:*:*:*","matchCriteriaId":"3C901164-2DD6-4D8A-997B-DFDB7D68DF1C"}]}]}],"references":[{"url":"https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024","source":"security@progress.com","tags":["Vendor Advisory"]},{"url":"https://www.progress.com/network-monitoring","source":"security@progress.com","tags":["Product"]},{"url":"https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.progress.com/network-monitoring","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}