CVE-2024-56135

8.4 HIGH

📋 TL;DR

This CVE-2024-56135 is an authenticated OS command injection vulnerability in Progress LoadMaster that allows authenticated users to execute arbitrary operating system commands. It affects LoadMaster versions from 7.2.55.0 to 7.2.60.1, 7.2.49.0 to 7.2.54.12, and all versions prior to 7.2.48.12, as well as ECS versions prior to 7.2.60.1.

💻 Affected Systems

Products:
  • Progress LoadMaster
  • ECS
Versions: LoadMaster: 7.2.55.0 to 7.2.60.1, 7.2.49.0 to 7.2.54.12, all versions prior to 7.2.48.12; ECS: all versions prior to 7.2.60.1
Operating Systems: Not specified - LoadMaster-specific appliance/software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; affects both LoadMaster and ECS products across multiple version ranges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level access, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized command execution leading to service disruption, configuration changes, and potential credential theft.

🟢

If Mitigated

Limited impact with proper network segmentation, minimal authenticated user access, and command execution restrictions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access; exploitation depends on input validation bypass techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.2.60.2 or later for LoadMaster and ECS

Vendor Advisory: https://community.progress.com/s/article/LoadMaster-Security-Vulnerability-CVE-2024-56131-CVE-2024-56132-CVE-2024-56133-CVE-2024-56134-CVE-2024-56135

Restart Required: No

Instructions:

1. Backup current configuration. 2. Download and apply patch version 7.2.60.2 or later from Progress support portal. 3. Verify patch installation through version check. 4. Test functionality post-patch.

🔧 Temporary Workarounds

Restrict Authenticated User Access

all

Limit the number of authenticated users and implement least privilege access controls.

Network Segmentation

all

Isolate LoadMaster/ECS systems from critical infrastructure and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict input validation at application layer if possible
  • Monitor for unusual command execution patterns and user activity

🔍 How to Verify

Check if Vulnerable:

Check LoadMaster/ECS version via web interface or CLI; compare against affected version ranges.

Check Version:

Check via LoadMaster web interface: System > System Configuration > Version Information

Verify Fix Applied:

Verify version is 7.2.60.2 or later; test authenticated user input validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns
  • Multiple failed authentication attempts followed by successful login
  • Unexpected system process creation

Network Indicators:

  • Unusual outbound connections from LoadMaster systems
  • Unexpected protocol usage

SIEM Query:

source="loadmaster" AND (event_type="command_execution" OR user_activity="unusual")

🔗 References

📤 Share & Export