Progress Software fixed multiple high-severity LoadMaster flaws


Progress Software fixed multiple high-severity LoadMaster flaws

Pierluigi Paganini
February 11, 2025

Progress Software fixed multiple vulnerabilities in its LoadMaster software, which could be exploited to execute arbitrary system commands.

Progress Software has addressed multiple high-severity security vulnerabilities (CVE-2024-56131, CVE-2024-56132, CVE-2024-56133, CVE-2024-56134, CVE-2024-56135) in its LoadMaster software.

Progress Software’s LoadMaster is a high-performance load balancer and application delivery controller (ADC) designed to optimize the availability, security, and performance of web applications and services. It helps distribute network traffic efficiently across multiple servers to ensure reliability and scalability.

Below are the descriptions of these vulnerabilities:

  • CVE-2024-56131 (CVSS scores: 8.4) is an Improper input validation vulnerability that could allow an authenticated User in LoadMaster to achieve OS Command Injection.
  • CVE-2024-56132 (CVSS scores: 8.4) is an Improper input validation vulnerability that could allow an authenticated User in LoadMaster to achieve OS Command Injection.
  • CVE-2024-56133 is an Improper input validation vulnerability that could allow an authenticated User in LoadMaster to achieve OS Command Injection.
  • CVE-2024-56135 (CVSS scores: 8.4) is an Improper input validation vulnerability that could allow an authenticated User in LoadMaster to achieve OS Command Injection.

Once a remote attacker gained access to the management interface of LoadMaster and successfully authenticated could execute arbitrary system commands by using specially crafted HTTP requests.

The last high-severity flaw addressed by Progress, tracked as CVE-2024-56134 (CVSS score: 8.4), is an improper input validation vulnerability that could allow remote attackers who gain access to the management interface and successfully authenticate to download the content of any file on the system. The attacker could exploit the flaw via a specially crafted HTTP request

The vulnerabilities impact the following versions: 

The company is not aware of attacks in the wild exploiting one of the above vulnerabilities.

In November, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the CVE-2024-1212 Progress Kemp LoadMaster issue to its Known Exploited Vulnerabilities (KEV) catalog.

CVE-2024-1212 is a Progress Kemp LoadMaster OS command injection issue that unauthenticated remote attackers can exploit to execute arbitrary system commands, posing significant security risks.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Progress LoadMaster)







Source link