Progress Software program has issued an emergency repair for a most (10/10) severity vulnerability impacting its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor merchandise that permits attackers to remotely execute instructions on the machine.
The flaw, tracked as CVE-2024-7591, is categorized as an improper enter validation drawback permitting an unauthenticated, distant attacker to entry LoadMaster’s administration interface utilizing a specifically crafted HTTP request.
Nonetheless, the dearth of person enter sanitization might additionally enable the attacker to execute arbitrary system instructions on weak endpoints.
“It is possible for unauthenticated, remote attackers who have access to the management interface of LoadMaster to issue a carefully crafted HTTP request that will allow arbitrary system commands to be executed,” reads the safety bulletin.
“This vulnerability has been closed by sanitizing request user input to mitigate arbitrary system commands execution.”
LoadMaster is an utility supply controller (ADC) and cargo balancing resolution utilized by giant organizations for optimizing app efficiency, managing community visitors, and guaranteeing excessive service availability.
The MT Hypervisor is a model of LoadMaster designed for multi-tenant environments, permitting a number of digital community capabilities to run on the identical {hardware}.
CVE-2024-7591 was discovered to affect LoadMaster model 7.2.60.0 and all earlier variations, and likewise the MT Hypervisor model 7.1.35.11 and all prior releases. Lengthy-Time period Assist (LTS) and Lengthy-Time period Assist with Characteristic (LTSF) branches are additionally impacted.
To repair the flaw, Progress launched an add-on bundle that may be put in on any of the weak variations, together with older releases, so there’s no goal variations to improve to to be able to handle the danger from this vulnerability.
Nonetheless, the patch doesn’t apply to the free model of LoadMaster, so CVE-2024-7591 stays an issue there.
Progress Software program says it has not obtained any experiences of lively exploitation for the vulnerability as of the publication of its bulletin.
However, all LoadMaster customers are advisable to take the suitable motion to safe their setting in opposition to this risk, together with putting in the add-on and likewise implementing the vendor-recommended safety hardening measures.