CVE-2024-7591

10.0 CRITICAL

📋 TL;DR

CVE-2024-7591 is an OS command injection vulnerability in Progress LoadMaster load balancers that allows attackers to execute arbitrary commands on the underlying operating system. This affects LoadMaster 7.2.40.0+, ECS all versions, and Multi-Tenancy 7.1.35.4+. Attackers can potentially gain full control of affected systems.

💻 Affected Systems

Products:
  • Progress LoadMaster
  • LoadMaster ECS
  • LoadMaster Multi-Tenancy
Versions: LoadMaster: 7.2.40.0 and above; ECS: All versions; Multi-Tenancy: 7.1.35.4 and above
Operating Systems: LoadMaster OS (custom appliance OS)
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions in default configuration are vulnerable. The vulnerability exists in the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, pivot to internal networks, steal sensitive data, install persistent backdoors, or disrupt critical services.

🟠

Likely Case

Unauthenticated remote code execution leading to system takeover, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, strict access controls, and monitoring are in place, though system compromise remains possible.

🌐 Internet-Facing: HIGH - Load balancers are typically internet-facing, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal systems could still be compromised through lateral movement or insider threats.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public technical details and proof-of-concept are available. The vulnerability requires no authentication and is easy to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LoadMaster 7.2.60.3 and later

Vendor Advisory: https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download patch from Kemp support portal. 3. Apply patch via LoadMaster web interface. 4. Restart LoadMaster services. 5. Verify patch installation.

🔧 Temporary Workarounds

Restrict Web Management Interface Access

all

Limit access to LoadMaster web management interface to trusted IP addresses only

Configure firewall rules to restrict access to LoadMaster management IP/ports

Disable Unused Features

all

Disable any unnecessary web management features that might be vulnerable

Review and disable non-essential web interface functions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate LoadMaster from critical systems
  • Enable comprehensive logging and monitoring for suspicious command execution attempts

🔍 How to Verify

Check if Vulnerable:

Check LoadMaster version via web interface: System Configuration > System Administration > System Information

Check Version:

Via web interface or SSH: cat /etc/version

Verify Fix Applied:

Verify version is 7.2.60.3 or later and test for command injection using safe test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Suspicious web requests to management interface
  • Failed authentication attempts followed by command execution

Network Indicators:

  • Unusual outbound connections from LoadMaster
  • Traffic patterns indicating command and control activity
  • Unexpected network scans from LoadMaster

SIEM Query:

source="loadmaster" AND (command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*" OR command="*&*" OR command="*&&*")

🔗 References

📤 Share & Export