HomeVulnerabilityProgress LoadMaster susceptible to 10/10 severity RCE flaw

Progress LoadMaster susceptible to 10/10 severity RCE flaw

Progress Software program has issued an emergency repair for a most (10/10) severity vulnerability impacting its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor merchandise that permits attackers to remotely execute instructions on the system.

The flaw, tracked as CVE-2024-7591, is categorized as an improper enter validation downside permitting an unauthenticated, distant attacker to entry LoadMaster’s administration interface utilizing a specifically crafted HTTP request.

Nevertheless, the shortage of consumer enter sanitization might additionally permit the attacker to execute arbitrary system instructions on susceptible endpoints.

“It’s potential for unauthenticated, distant attackers who’ve entry to the administration interface of LoadMaster to problem a rigorously crafted HTTP request that may permit arbitrary system instructions to be executed,” reads the security bulletin.

“This vulnerability has been closed by sanitizing request consumer enter to mitigate arbitrary system instructions execution.”

LoadMaster is an software supply controller (ADC) and cargo balancing answer utilized by massive organizations for optimizing app efficiency, managing community site visitors, and guaranteeing excessive service availability.

See also  New Analysis Reveals Spectre Vulnerability Persists in Newest AMD and Intel Processors

The MT Hypervisor is a model of LoadMaster designed for multi-tenant environments, permitting a number of digital community features to run on the identical {hardware}.

CVE-2024-7591 was discovered to affect LoadMaster model 7.2.60.0 and all earlier variations, and likewise the MT Hypervisor model 7.1.35.11 and all prior releases. Lengthy-Time period Assist (LTS) and Lengthy-Time period Assist with Characteristic (LTSF) branches are additionally impacted.

To repair the flaw, Progress launched an add-on package deal that may be put in on any of the susceptible variations, together with older releases, so there’s no goal variations to improve to as a way to handle the danger from this vulnerability.

Nevertheless, the patch doesn’t apply to the free model of LoadMaster, so CVE-2024-7591 stays an issue there.

Progress Software program says it has not acquired any reviews of energetic exploitation for the vulnerability as of the publication of its bulletin.

Nonetheless, all LoadMaster customers are really useful to take the suitable motion to safe their surroundings in opposition to this chance, together with putting in the add-on and likewise implementing the vendor-recommended security hardening measures.

See also  FIRST Releases CVSS 4.0 Vuln Scoring Commonplace
- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular