Progress Software Corporation has disclosed a critical vulnerability, CVE-2024-7591, affecting its LoadMaster application delivery controller (ADC) and load balancer. This vulnerability allows unauthenticated, remote attackers to execute arbitrary system commands on the LoadMaster device simply by exploiting the management interface. The vulnerability has a CVSS score of 10. The Progress LoadMaster ADC and load balancing solution ensures the availability, scalability, performance, and security of critical applications and websites for businesses of all sizes. The newly discovered flaw, however, poses a significant security risk for unpatched versions of the software. A vulnerability exists in the LoadMaster management interface as a result of improper input validation, allowing attackers to inject OS commands. By exploiting this flaw, malicious actors are able to execute commands on the underlying operating system without being authenticated. It also affects LoadMaster Multi-Tenant specifically the MT hypervisor or Manager node and the LoadMaster VNFs. It is imperative that these components are patched as soon as possible to avoid potential exploitation. Progress Software has released an add-on package that sanitizes user input to prevent arbitrary command execution. LoadMaster packages can be downloaded and installed on any version, even if the unit is no longer supported. Although Progress has not reported active exploitation of this vulnerability and its critical nature demands urgent action. Delaying the application of necessary patches could expose organizations to significant security risks. Prioritize the immediate deployment of the add-on patch to all compromised systems. Ensure all LoadMaster systems are current with the latest security updates. Vigilantly monitor network traffic for any unusual behaviour that could signal attempted exploitation. Prompt action is essential to protect against this severe vulnerability and safeguard your systems from potential threats.
Cybersecurity researchers recently identified a renewed phishing operation connected to the Tycoon 2FA Phishing as a Service platform, demonstrating how attackers are changing tact...
Apple’s latest M5 silicon, promoted as one of the most secure processor architectures ever developed for macOS, has reportedly been compromised in the first public kernel memory ...
A recently disclosed vulnerability in Android 16 has sparked privacy concerns after security researchers discovered that malicious applications can bypass VPN protections and expos...