{"api_version":"1","generated_at":"2026-04-23T16:56:11+00:00","cve":"CVE-2022-29847","urls":{"html":"https://cve.report/CVE-2022-29847","api":"https://cve.report/api/cve/CVE-2022-29847.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-29847","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-29847"},"summary":{"title":"CVE-2022-29847","description":"In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-05-11 18:15:00","updated_at":"2022-05-20 14:36:00"},"problem_types":["CWE-918"],"metrics":[],"references":[{"url":"https://www.progress.com/network-monitoring","name":"https://www.progress.com/network-monitoring","refsource":"MISC","tags":[],"title":"WhatsUp Gold Network Monitoring Software | Progress","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022","name":"https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022","refsource":"MISC","tags":[],"title":"Progress Customer Community","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-29847","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-29847","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"29847","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ipswitch","cpe5":"whatsup_gold","cpe6":"22.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"29847","vulnerable":"1","versionEndIncluding":"21.1.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ipswitch","cpe5":"whatsup_gold","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-29847","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Progress Ipswitch WhatsUp Gold 21.0.0 through 21.1.1, and 22.0.0, it is possible for an unauthenticated attacker to invoke an API transaction that would allow them to relay encrypted WhatsUp Gold user credentials to an arbitrary host."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.progress.com/network-monitoring","refsource":"MISC","name":"https://www.progress.com/network-monitoring"},{"refsource":"MISC","name":"https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022","url":"https://community.progress.com/s/article/WhatsUp-Gold-Critical-Product-Alert-May-2022"}]}},"nvd":{"publishedDate":"2022-05-11 18:15:00","lastModifiedDate":"2022-05-20 14:36:00","problem_types":["CWE-918"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ipswitch:whatsup_gold:22.0.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*","versionStartIncluding":"21.0.0","versionEndIncluding":"21.1.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}