Remote Attackers Can Execute Arbitrary System Commands via LoadMaster Management Interface
CVE-2024-1212

9.8CRITICAL

Key Information:

Vendor
CVE Published:
21 February 2024

Badges

πŸ₯‡ Trended No. 1πŸ“ˆ TrendedπŸ“ˆ Score: 6,880πŸ‘Ύ Exploit Exists🟑 Public PoC🟣 EPSS 93%πŸ¦… CISA ReportedπŸ“° News Worthy

What is CVE-2024-1212?

CVE-2024-1212 is a significant vulnerability found in the LoadMaster management interface developed by Progress Software. This vulnerability permits unauthorized remote attackers to exploit the LoadMaster system, enabling them to execute arbitrary system commands. As LoadMaster is primarily used for load balancing and application delivery, this flaw poses a substantial risk to organizations relying on the product for their operations. If exploited, this vulnerability can lead to severe disruptions, unauthorized access to sensitive data, and substantial reputational damage.

Technical Details

The vulnerability exists due to improper access controls within the LoadMaster management interface, allowing unauthenticated users to gain entry to the system. By exploiting this flaw, attackers can execute arbitrary commands on the affected system, thus gaining control over critical functions and processes. This vulnerability may arise from misconfigurations or oversights in the security implementations of the LoadMaster software, highlighting a concerning area in which server management best practices must be observed rigorously.

Impact of the Vulnerability

  1. Unauthorized System Access: Attackers can gain unrestricted access to the management interface of the LoadMaster, allowing them to perform unauthorized actions that could compromise the integrity of the entire system.

  2. Potential for Remote Code Execution: The ability to execute arbitrary commands can lead to full system compromise, where an attacker can manipulate configurations, deploy malware, or further infiltrate the network.

  3. Data Breaches and Sensitive Information Exposure: By exploiting this vulnerability, attackers may access confidential data stored within the LoadMaster or within connected applications, resulting in severe data loss and potential legal repercussions for organizations due to data protection regulations.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

LoadMaster Linux 7.2.48.1

LoadMaster Linux 7.2.48.1 < 7.2.48.10

LoadMaster Linux 7.2.54.0 < 7.2.54.8

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CISA Warns Kemp LoadMaster OS Command Injection Vulnerability Exploited in Attacks

CISA issued an urgent security advisory warning organizations about an active exploitation of a vulnerability in Progress Kemp LoadMaster.

2 months ago

CISA Warns of Progress Kemp LoadMaster Vulnerability Exploitation

CISA is warning organizations that CVE-2024-1212, a Kemp LoadMaster OS command injection vulnerability, is being exploited in attacks.

2 months ago

CISA tags Progress Kemp LoadMaster flaw as exploited in attacks

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added three new flaws in its Known Exploited Vulnerabilities (KEV) catalog, including a critical OS command injection impacting Progress Kemp LoadMaster.

2 months ago

References

EPSS Score

93% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ¦…

    CISA Reported

  • πŸ₯‡

    Vulnerability reached the number 1 worldwide trending spot

  • πŸ“ˆ

    Vulnerability started trending

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by ctrl.co

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseCISA Database1 Proof of Concept(s)8 News Article(s)

Credit

Rhino Security Labs
.