Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-6658
Analyzed
More InfoOfficial Page
Source-security@progress.com
View Known Exploited Vulnerability (KEV) details
Published At-12 Sep, 2024 | 15:18
Updated At-30 Jul, 2025 | 16:24

Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.This issue affects:  Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.0 (inclusive)    From 7.2.49.0 to 7.2.54.11 (inclusive)    7.2.48.12 and all prior versions Multi-Tenant Hypervisor 7.1.35.11 and all prior versions ECS All prior versions to 7.2.60.0 (inclusive)

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.4HIGH
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Primary3.16.8MEDIUM
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CPE Matches

Progress Software Corporation
progress
>>multi-tenant_loadmaster>>Versions before 7.1.35.12(exclusive)
cpe:2.3:a:progress:multi-tenant_loadmaster:*:*:*:*:*:*:*:*
Progress Software Corporation
progress
>>loadmaster>>Versions up to 7.2.48.12(inclusive)
cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*
Progress Software Corporation
progress
>>loadmaster>>Versions from 7.2.49.0(inclusive) to 7.2.54.12(exclusive)
cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*
Progress Software Corporation
progress
>>loadmaster>>Versions from 7.2.55.0(inclusive) to 7.2.60.1(exclusive)
cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Secondarysecurity@progress.com
NVD-CWE-noinfoPrimarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://support.kemptechnologies.com/hc/en-us/articles/28910587250701security@progress.com
Vendor Advisory
Change History
0Changes found

Details not found