Article Details
Scrape Timestamp (UTC): 2024-09-09 09:31:47.270
Source: https://thehackernews.com/2024/09/progress-software-issues-patch-for.html
Original Article Text
Click to Toggle View
Progress Software Issues Patch for Vulnerability in LoadMaster and MT Hypervisor. Progress Software has released security updates for a maximum-severity flaw in LoadMaster and Multi-Tenant (MT) hypervisor that could result in the execution of arbitrary operating system commands. Tracked as CVE-2024-7591 (CVSS score: 10.0), the vulnerability has been described as an improper input validation bug that results in OS command injection. "It is possible for unauthenticated, remote attackers who have access to the management interface of LoadMaster to issue a carefully crafted http request that will allow arbitrary system commands to be executed," the company said in an advisory last week. "This vulnerability has been closed by sanitizing request user input to mitigate arbitrary system commands execution." The flaw affects the following versions - Security researcher Florian Grunow has been credited with discovering and reporting the flaw. Progress said it has found no evidence of the vulnerability being exploited in the wild. That said, it's recommended that users apply the latest fixes as soon as possible by downloading an add-on package. The update can be installed by navigating to System Configuration > System Administration > Update Software. "We are encouraging all customers to upgrade their LoadMaster implementations as soon as possible to harden their environment," the company said. "We also strongly recommend that customers follow our security hardening guidelines."
Daily Brief Summary
Progress Software has issued security updates for a significant vulnerability in LoadMaster and MT hypervisor, rated CVSS 10.0.
The flaw, identified as CVE-2024-7591, involves improper input validation allowing OS command injection by unauthenticated users.
Attackers could execute arbitrary system commands remotely via the management interface by sending a specially crafted HTTP request.
The company has mitigated this vulnerability by sanitizing user input to prevent arbitrary command execution.
Florian Grunow, a security researcher, discovered and reported the vulnerability, emphasizing its severity.
No current evidence suggests that the vulnerability has been exploited in the wild, according to Progress Software.
Users are urged to download the latest patch immediately and follow recommended security hardening guidelines to protect their systems.