Description
Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote attackers to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header to "NmConsole".
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Kenneth F. Belva · textremotehardware
https://www.exploit-db.com/exploits/27891
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/434247/100/0/threaded
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/434447/100/0/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1849
Various Sources x_refsource_misc
http://www.ftusecurity.com/pub/whatsup.public.pdf
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/18019
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/26529
Scores
EPSS
0.0478
EPSS Percentile
89.5%
Details
Status
published
Products (1)
ipswitch/whatsup
professional_2006
Published
May 22, 2006
Tracked Since
Feb 18, 2026