Input Validation Flaw in Progress LoadMaster Exposes Systems to Command Injection
CVE-2024-56131
Key Information:
- Vendor
- Progress
- Status
- Loadmaster
- Vendor
- CVE Published:
- 5 February 2025
Badges
Summary
An improperly handled input validation issue in Progress LoadMaster allows authenticated users to execute OS command injection attacks. This vulnerability affects several versions of LoadMaster, Multi-Tenant Hypervisor, and ECS, putting sensitive data and system integrity at risk. Malicious actors could exploit this flaw to gain unauthorized access, leading to potential data breaches or system manipulations. Users are urged to update to the latest secure versions to mitigate any risks associated with this vulnerability.
Affected Version(s)
LoadMaster All Previous Versions < 7.2.61.0
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
Progress Software Patches High-Severity LoadMaster Flaws Affecting Multiple Versions
Progress Software fixes high-severity LoadMaster flaws (CVSS 8.4) enabling command execution and file access. Affected users must update immediately.
6 days ago
Critical Flaw in Progress LoadMaster Allows Attackers to Execute System Commands
A series of critical security vulnerabilities have been identified in Progress Software's LoadMaster application, potentially allowing remote attackers to execute system commands or access sensitive files.
6 days ago
References
CVSS V3.1
Timeline
- 📰
First article discovered by GBHackers News
Vulnerability published
Vulnerability Reserved