Divya
2024-12-04 03:00:00
gbhackers.com
A registry overwrite remote code execution (RCE) vulnerability has been identified in NmAPI.exe, part of the WhatsUp Gold network monitoring software.
This vulnerability, present in versions before 24.0.1, allows an unauthenticated remote attacker to execute arbitrary code on affected systems, posing significant security risks.
Vulnerability Details
The vulnerability lies within NmAPI.exe, a Windows Communication Foundation (WCF) application utilized by WhatsUp Gold.
Specifically, the flaw is found in the UpdateFailoverRegistryValues operation.
This function allows interactions with the Windows registry, enabling an attacker to write or alter registry entries without authentication.
Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar
The operation can be exploited via a netTcpBinding at the endpoint net.tcp://
A key aspect of this vulnerability is the ability to change the InstallDir registry entry to point to a Universal Naming Convention (UNC) path controlled by an attacker, such as \\
Exploit Mechanism
Once the attacker manipulates the registry to redirect the InstallDir to an attacker-controlled network share, the stage is set for further exploitation.
When the Ipswitch Service Control Manager (ServiceControlManager.exe) service restarts—possibly triggered by a system restart or Windows update—it attempts to read various manifest files from the specified UNC path.
This action enables the attacker to define new processes to be executed by including a
This configuration results in the automatic execution of a malicious executable (evil.exe) controlled by the attacker.
According to the Tenable report, the release of a Proof-of-Concept (PoC) exploit underscores the urgency for organizations using affected versions of WhatsUp Gold to upgrade to version 24.0.1 or later.
Failure to patch this vulnerability could lead to unauthorized access and control over systems, highlighting the importance of immediate action in securing network monitoring environments.
Cybersecurity experts advise implementing network-level mitigations alongside the software update. This includes restricting access to TCP port 9643 to trusted hosts and continuously monitoring for any suspicious registry modifications.
As always, maintaining up-to-date backups and implementing comprehensive intrusion detection systems are essential components of a robust security posture.
Analyse Advanced Malware & Phishing Analysis With ANY.RUN Black Friday Deals : Get up to 3 Free Licenses.
Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.
Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!
Support Techcratic
If you find value in Techcratic’s insights and articles, consider supporting us with Bitcoin. Your support helps me, as a solo operator, continue delivering high-quality content while managing all the technical aspects, from server maintenance to blog writing, future updates, and improvements. Support Innovation! Thank you.
Bitcoin Address:
bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge
Please verify this address before sending funds.
Bitcoin QR Code
Simply scan the QR code below to support Techcratic.
Please read the Privacy and Security Disclaimer on how Techcratic handles your support.
Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.