Improper Input Validation (CWE-20)
Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection. This vulnerability affects LoadMaster versions 7.2.40.0 and above, all versions of ECS, and Multi-Tenancy versions 7.1.35.4 and above. The issue allows unauthenticated remote attackers to access the management interface of LoadMaster. By sending a specially crafted HTTP request, attackers can execute arbitrary system commands.
The impact of this vulnerability is severe. Attackers can gain unauthorized access to the management interface of LoadMaster and execute arbitrary system commands. This could potentially lead to complete system compromise, data theft, service disruption, or use of the compromised system as a pivot point for further attacks in the network. The vulnerability has a CVSS v3.1 base score of 7.2, indicating a high severity level with high impacts on confidentiality, integrity, and availability.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Progress Kemp has released security updates as of August 19, 2024. The patch is provided as an add-on package that can be installed on any version of LoadMaster, even if support for the device has expired. The add-on can be downloaded from a link provided by the manufacturer and installed according to instructions in their Knowledge Base article.
1. Immediately update affected products with the provided security add-on. 2. For Multi-Tenant LoadMaster (LoadMaster MT): - Patch individual instantiated LoadMaster VNFs as soon as possible. - Patch the MT-Hypervisor or Manager node as quickly as possible. 3. Install the add-on package even on devices with expired support. 4. Monitor systems for any signs of unauthorized access or unusual activity. 5. Consider implementing additional network segmentation to limit potential access to the management interface.
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Feedly found the first article mentioning CVE-2024-7591. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-7591
A CVSS base score of 10 has been assigned.
EPSS Score was set to: 0.04% (Percentile: 9.6%)
This CVE started to trend in security discussions
This CVE stopped trending in security discussions
A CVSS base score of 7.2 has been assigned.