Progress Software Patches Critical LoadMaster Vulnerability: Are You Safe?

Progress Software issues an emergency fix for a 10/10 severity vulnerability in LoadMaster and LoadMaster MT Hypervisor products. The flaw, CVE-2024-7591, allows remote attackers to execute commands. An add-on package is available to address the risk for most versions, except the free one, so patch…

Hot Take:

Progress Software’s latest fix is like duct tape on a sinking ship—necessary, but you might still need a lifeboat! CVE-2024-7591 is the latest reminder that even vital systems can have glaring vulnerabilities. At least Progress is quick with the patch, but let’s not forget to hold our breaths for the free version users left in the dark.

Key Points:

  • Progress Software issues a critical fix for LoadMaster and LoadMaster Multi-Tenant Hypervisor.
  • CVE-2024-7591 allows remote command execution via a specially crafted HTTP request.
  • The flaw affects LoadMaster version 7.2.60.0 and earlier, and MT Hypervisor version 7.1.35.11 and earlier.
  • Patches released for all vulnerable versions, except the free version of LoadMaster.
  • No active exploitation reported, but users urged to apply patches and security measures.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here