{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-7591","assignerOrgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","state":"PUBLISHED","assignerShortName":"ProgressSoftware","dateReserved":"2024-08-07T14:49:00.971Z","datePublished":"2024-09-05T17:16:30.342Z","dateUpdated":"2025-02-18T15:36:20.769Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"LoadMaster","vendor":"Progress","versions":[{"lessThan":"7.2.60.1","status":"affected","version":"7.2.40.0","versionType":"LoadMaster"}]}],"credits":[{"lang":"en","type":"finder","value":"Florian Grunow - ERNW"},{"lang":"en","type":"finder","value":"Marius Walter - ERNW"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection.<p>This issue affects:</p><p>* LoadMaster: 7.2.40.0 and above</p><p><span style=\"background-color: var(--wht);\">* ECS: All versions</span></p><p>* Multi-Tenancy: 7.1.35.4 and above<br></p>"}],"value":"Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection.This issue affects:\n\n* LoadMaster: 7.2.40.0 and above\n\n* ECS: All versions\n\n* Multi-Tenancy: 7.1.35.4 and above"}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88: OS Command Injection"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":10,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f9fea0b6-671e-4eea-8fde-31911902ae05","shortName":"ProgressSoftware","dateUpdated":"2025-02-18T15:36:20.769Z"},"references":[{"url":"https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591"},{"url":"https://insinuator.net/2024/11/vulnerability-disclosure-command-injection-in-kemp-loadmaster-load-balancer-cve-2024-7591"}],"source":{"discovery":"UNKNOWN"},"title":"Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"kemptechnologies","product":"loadmaster","cpes":["cpe:2.3:a:kemptechnologies:loadmaster:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"7.2.40.0","status":"affected","lessThanOrEqual":"7.2.60.0","versionType":"custom"}]},{"vendor":"kemptechnologies","product":"loadmaster_mt","cpes":["cpe:2.3:a:kemptechnologies:loadmaster_mt:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"7.1.35.4","status":"affected","lessThanOrEqual":"7.1.35.11","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-10T03:55:17.125312Z","id":"CVE-2024-7591","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-25T20:42:57.041Z"}}]}}