Monday, March 17, 2025
HomeCVE/vulnerabilityCritical Flaw in Progress LoadMaster Allows Attackers to Execute System Commands

Critical Flaw in Progress LoadMaster Allows Attackers to Execute System Commands

Published on

SIEM as a Service

Follow Us on Google News

 A series of critical security vulnerabilities have been identified in Progress Software’s LoadMaster application, potentially allowing remote attackers to execute system commands or access sensitive files.

CVE-2024-56131CVE-2024-56132CVE-2024-56133CVE-2024-56134, and CVE-2024-56135, affect all current versions of LoadMaster, including Multi-Tenant LoadMaster (MT) deployments, prompting an urgent patch advisory for users.

Progress Software has confirmed that no active exploits of these vulnerabilities have been reported. However, due to the risks posed, the company is strongly urging all users to update their LoadMaster implementations immediately.

Details of the Vulnerabilities

  • Vulnerabilities CVE-2024-56131, CVE-2024-56132, CVE-2024-56133, and CVE-2024-56135 enable attackers who gain access to the management interface and authenticate successfully to issue specially crafted HTTP requests. These requests could allow malicious actors to execute arbitrary system commands on the affected servers.
  • CVE-2024-56134, on the other hand, allows authenticated attackers to download the contents of arbitrary files on the system using a similar technique.

To mitigate these flaws, Progress Software has implemented input sanitization measures to prevent the execution of arbitrary system commands and unauthorized file access.

Patch Release Details

Progress Software has released patched firmware versions to address these vulnerabilities. Users are encouraged to upgrade to the fixed versions immediately:

ProductAffected VersionsPatched VersionsRelease Date
LoadMaster7.2.55.0 to 7.2.60.17.2.61.0 (GA)February 5, 2025
LoadMaster7.2.49.0 to 7.2.54.127.2.54.13 (LTSF)February 5, 2025
LoadMaster7.2.48.12 and earlier versionsUpgrade to LTSF/GAFebruary 5, 2025
Multi-Tenant LoadMaster7.1.35.12 and earlier versions7.1.35.13 (GA)February 5, 2025

Multi-Tenant (MT) hypervisors and instantiated LoadMaster Virtual Network Functions (VNFs) are also vulnerable and require the same updates.

To secure their systems, customers should promptly download the latest firmware version from the LoadMaster Support Portal and follow the upgrade instructions detailed in the company’s Knowledge Base article.

Additionally, Progress Software recommends adhering to its security hardening guidelines for robust protection.

For further assistance, affected customers are advised to open a Technical Support case through the LoadMaster customer community.

This critical update underscores the importance of maintaining up-to-date security measures to prevent potential threats.

Are you from SOC/DFIR Team? - Join 500,000+ Researchers to Analyze Cyber Threats with ANY.RUN Sandbox - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...

MassJacker Clipper Malware Targets Users Installing Pirated Software

A recent investigation has uncovered previously unknown cryptojacking malware, dubbed MassJacker, which primarily targets...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Rapidly Adopt ClickFix Technique for Sophisticated Attacks

In recent months, a sophisticated social engineering technique known as ClickFix has gained significant...

Supply Chain Attack Targets 23,000 GitHub Repositories

A critical security incident has been uncovered involving the popular GitHub Action tj-actions/changed-files, which...

Beware! Malware Hidden in Free Word-to-PDF Converters

The FBI has issued a warning about a growing threat involving free file conversion...