CVE-2006-2531

Ipswitch WhatsUp Professional 2006 - Auth Bypass

Title source: llm
STIX 2.1

Description

Ipswitch WhatsUp Professional 2006 only verifies the user's identity via HTTP headers, which allows remote attackers to spoof being a trusted console and bypass authentication by setting HTTP User-Agent header to "Ipswitch/1.0" and the User-Application header to "NmConsole".

Exploits (1)

exploitdb WORKING POC VERIFIED
by Kenneth F. Belva · textremotehardware
https://www.exploit-db.com/exploits/27891

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/434247/100/0/threaded
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/434447/100/0/threaded
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/1849
Various Sources x_refsource_misc
http://www.ftusecurity.com/pub/whatsup.public.pdf
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/18019
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/26529

Scores

EPSS 0.0478
EPSS Percentile 89.5%

Details

Status published
Products (1)
ipswitch/whatsup professional_2006
Published May 22, 2006
Tracked Since Feb 18, 2026