Unauthenticated attackers can perform actions, using SSH private keys, by knowing the IP address and having access to the same network of one of the machines in the HA or Cluster group. This vulnerability has been closed by enhancing LoadMaster partner communications to require a shared secret that must be exchanged between the partners before communication can proceed.
References
Configurations
Configuration 1 (hide)
|
History
03 Feb 2025, 21:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:progress:loadmaster:*:*:*:*:ltsf:*:*:* cpe:2.3:a:progress:loadmaster:*:*:*:*:ga:*:*:* cpe:2.3:a:progress:loadmaster:*:*:*:*:lts:*:*:* |
|
References | () https://kemptechnologies.com/ - Product | |
References | () https://support.kemptechnologies.com/hc/en-us/articles/25724813518605-ECS-Connection-Manager-Security-Vulnerabilities-CVE-2024-3544-and-CVE-2024-3543 - Product | |
CWE | NVD-CWE-noinfo | |
First Time |
Progress
Progress loadmaster |
Information
Published : 2024-05-02 15:15
Updated : 2025-02-03 21:38
NVD link : CVE-2024-3544
Mitre link : CVE-2024-3544
CVE.ORG link : CVE-2024-3544
JSON object : View
Products Affected
progress
- loadmaster
CWE