CVE-2024-3544

7.5 HIGH

📋 TL;DR

Unauthenticated attackers on the same network can use SSH private keys to perform actions on LoadMaster HA/Cluster machines by knowing their IP addresses. This affects Kemp LoadMaster products with High Availability or Cluster configurations. The vulnerability allows unauthorized access to partner communications.

💻 Affected Systems

Products:
  • Kemp LoadMaster
Versions: Specific versions not provided in CVE description; consult vendor advisory for exact affected versions
Operating Systems: LoadMaster OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects LoadMaster configurations with High Availability or Cluster groups enabled. Requires attacker to be on same network segment as partner communications.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of LoadMaster cluster nodes leading to service disruption, data exposure, or lateral movement within the network.

🟠

Likely Case

Unauthorized access to partner communications allowing configuration changes, service disruption, or information disclosure.

🟢

If Mitigated

Limited impact due to network segmentation and proper access controls restricting attacker access to partner communication networks.

🌐 Internet-Facing: MEDIUM - While the attack requires network access, internet-facing LoadMaster instances could be targeted if partner communications are exposed.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this without authentication to affect HA/Cluster configurations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to partner communication channels and knowledge of target IP addresses. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult Kemp support for specific patched versions

Vendor Advisory: https://support.kemptechnologies.com/hc/en-us/articles/25724813518605-ECS-Connection-Manager-Security-Vulnerabilities-CVE-2024-3544-and-CVE-2024-3543

Restart Required: Yes

Instructions:

1. Access Kemp support portal for patched firmware. 2. Backup current configuration. 3. Apply firmware update. 4. Restart LoadMaster services. 5. Verify partner communications now require shared secret.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate LoadMaster partner communication networks from general network access

Access Control Lists

all

Implement strict ACLs to restrict access to LoadMaster HA/Cluster communication ports

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate LoadMaster partner communications
  • Monitor network traffic to/from LoadMaster HA/Cluster IP addresses for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check if LoadMaster HA/Cluster is configured and verify if partner communications use shared secret authentication

Check Version:

Login to LoadMaster web interface and check System > System Administration > System Information for firmware version

Verify Fix Applied:

Verify that partner communications now require a pre-shared secret and test that unauthenticated access is blocked

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized connection attempts to LoadMaster partner communication ports
  • Configuration changes without proper authentication logs

Network Indicators:

  • Unencrypted or unauthenticated traffic between LoadMaster cluster nodes
  • Unexpected SSH key usage in partner communications

SIEM Query:

source_ip IN (LoadMaster_IPs) AND (port IN (partner_ports) AND auth_result="failure")

🔗 References

📤 Share & Export