TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
No Result
View All Result
TechBriefly
Home Tech Security
How hackers can control LoadMaster without authentication

How hackers can control LoadMaster without authentication

Progress Kemp LoadMaster faces a severe security flaw (CVE-2024-1212) allowing command injections without authentication. CISA urges immediate patching to prevent active exploitation.

Bünyamin Furkan DemirkayabyBünyamin Furkan Demirkaya
19 November 2024
in Security
Reading Time: 3 mins read
Share on FacebookShare on Twitter

A major security flaw, known as CVE-2024-1212, has been discovered in the Progress Kemp LoadMaster. This vulnerability enables unauthorized attackers to run system commands through the LoadMaster management interface without authentication. This vulnerability has been given the highest severity rating, scoring a 10.0 on the CVSS scale, placing users at important risk of exploitation.

Exploited vulnerability in LoadMaster puts networks at risk — Are you patched yet?

Rhino Security Labs has announced that a vulnerability in the LoadMaster API’s implementation allows pre-authentication command injections. For those who are not familiar with it, the LoadMaster is a type of load balancer available in various versions, with a free option that is popularly used. The problem arises when API requests are made to the ‘ /access’ and ‘ /accessv2’ endpoints. The min-httpd server processes requests in a manner that enables attacker-manipulated data to be inserted into system commands.

More precisely, if a hacker sends an enable API command to the /access endpoint, the system will bypass crucial verification steps regarding the API’s enabled status. The data is read directly from the Authorization header, allowing the attacker to manipulate the ‘username’ value. The injected string is placed into the REMOTE_USER environment variable and then passed into a system() call, running commands in the bash shell. Remarkably, the susceptibility remains active even if the API is turned off, providing a disturbingly wide range of possible exploitation opportunities.

While examining this vulnerability, it was noted that the LoadMaster consists of two API functions. The latest v2 API handles JSON data requests using the /accessv2 endpoint. Nonetheless, there is a clear distinction. Simultaneously, the password variable can be altered. Before being passed to the vulnerable command execution path, the input is encoded in base64, preventing exploitation through this method.

How hackers can control LoadMaster without authentication
Progress Software fixed this vulnerability in February 2024, though the risk of it being exploited is still significant

Moreover, a fix has been applied to address the security vulnerabilities by shortening input strings that include apostrophes. This indicates that any possibly harmful quotation marks are removed before the system processes the command, preventing injection attempts.

The Cybersecurity and Infrastructure Security Agency (CISA) recently upgraded the classification of CVE-2024-1212 to a known vulnerability that is being actively exploited, further highlighting the situation’s urgency. Since the vulnerability was found, hackers have started to exploit it in actual situations, highlighting the importance of organizations utilizing Progress Kemp LoadMaster to install the provided updates. Progress Software fixed this vulnerability in February 2024, though the risk of it being exploited is still significant.

CISA has suggested that Federal Civilian Executive Branch agencies address this vulnerability by December 9, 2024, highlighting the severity of the problem. The agency cautioned that if successfully exploited, attackers could gain unrestricted access to the LoadMaster interface, enabling them to manipulate network behaviors.

Furthermore, these advancements align with warnings about more weaknesses, such as ones discovered in the VMware vCenter Server (CVE-2024-38812 and CVE-2024-38813). These actively exploited vulnerabilities highlight organizations’ need to strengthen their cybersecurity defenses. Using reliable tools like Tenable VM, Tenable SC, and Tenable Nessus, users can safeguard their systems by promptly installing patches and conducting vulnerability testing.


Image credit: Furkan Demirkaya/Flux AI

ShareTweet
Bünyamin Furkan Demirkaya

Bünyamin Furkan Demirkaya

Related Posts

Google patches critical Gemini flaw that turned invites into attack vectors

Google patches critical Gemini flaw that turned invites into attack vectors

21 January 2026
Microsoft issues emergency fix for Windows 11 shutdown bugs

Microsoft issues emergency fix for Windows 11 shutdown bugs

19 January 2026
Ashley St. Clair sues xAI over Grok deepfakes

Ashley St. Clair sues xAI over Grok deepfakes

16 January 2026
YouTube launches Shorts timers to combat teen doomscrolling

YouTube launches Shorts timers to combat teen doomscrolling

15 January 2026

LATEST

Türkiye competition authority raids Temu offices

OnePlus denies shutdown rumors following reports of 20% shipment decline

DeepSeek uncovers MODEL1 identifier ahead of V4 launch

Apple to shrink Dynamic Island on iPhone 18 Pro models

Nvidia shares dip as Inventec warns of H200 chip delays in China

OpenAI launches ads in ChatGPT to offset trillion-dollar infrastructure costs

Samsung revives Bixby with Perplexity AI for Galaxy S26 launch

Google patches critical Gemini flaw that turned invites into attack vectors

OpenAI targets H2 2026 launch for first ChatGPT-powered hardware

FTC appeals ruling in Meta antitrust case to revive divestiture threat

TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • | Network Sites |
  • Digital Report
  • LeaderGamer

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska