CVE-2025-13447

8.4 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with 'User Administration' permissions to execute arbitrary operating system commands on Progress LoadMaster appliances via unsanitized API input parameters. It enables remote code execution, potentially compromising the entire appliance. Organizations using affected Progress LoadMaster versions are at risk.

💻 Affected Systems

Products:
  • Progress LoadMaster
  • Progress Connection Manager for ObjectScale
  • Progress ECS Connection Manager
  • Progress MOVEit WAF
Versions: Specific versions not detailed in references; check vendor advisory for exact affected versions
Operating Systems: LoadMaster appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access with 'User Administration' permissions; default configurations may be vulnerable if these permissions are granted.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of LoadMaster appliance leading to data exfiltration, lateral movement to internal networks, service disruption, and persistent backdoor installation.

🟠

Likely Case

Attacker gains full control of LoadMaster appliance, potentially intercepting or modifying traffic, stealing credentials, and using the appliance as a foothold for further attacks.

🟢

If Mitigated

Limited impact due to proper access controls, network segmentation, and monitoring preventing successful exploitation or containing damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authentication is achieved; no public exploit code is currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://community.progress.com/s/article/LoadMaster-Vulnerabilities-CVE-2025-13444-CVE-2025-13447

Restart Required: Yes

Instructions:

1. Review vendor advisory for affected versions. 2. Download and apply the latest security patches from Progress. 3. Restart the LoadMaster appliance as required. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Restrict User Administration Permissions

all

Limit 'User Administration' permissions to only essential personnel to reduce attack surface.

Network Segmentation

all

Isolate LoadMaster management interfaces from untrusted networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement strict access controls to limit who has 'User Administration' permissions.
  • Monitor API logs for unusual command execution patterns and implement network segmentation.

🔍 How to Verify

Check if Vulnerable:

Check your LoadMaster version against the vendor advisory; if running an affected version and using API with User Administration permissions, you are vulnerable.

Check Version:

Check via LoadMaster web interface or CLI; specific command varies by version.

Verify Fix Applied:

Verify the appliance version matches or exceeds the patched version listed in the vendor advisory and test API functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls with command-like parameters
  • Multiple failed authentication attempts followed by successful User Administration API access
  • Unexpected system command execution in logs

Network Indicators:

  • Suspicious outbound connections from LoadMaster appliance
  • Unusual traffic patterns to/from management interfaces

SIEM Query:

Example: 'source="loadmaster" AND (api_call="*command*" OR user="*admin*")'

🔗 References

📤 Share & Export