First published: Thu May 02 2024(Updated: )
Unauthenticated attackers can perform actions, using SSH private keys, by knowing the IP address and having access to the same network of one of the machines in the HA or Cluster group. This vulnerability has been closed by enhancing LoadMaster partner communications to require a shared secret that must be exchanged between the partners before communication can proceed.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Kemp LoadMaster | <7.2.48.11 | |
Progress Kemp LoadMaster | >=7.2.49.0<7.2.54.10 | |
Progress Kemp LoadMaster | >=7.2.55.0<7.2.59.4 | |
Kemp LoadMaster |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3544 is categorized as a medium severity vulnerability due to its potential for unauthorized remote access.
To fix CVE-2024-3544, update your Progress Kemp LoadMaster to the latest version as recommended in the official security advisory.
CVE-2024-3544 affects users of Progress Kemp LoadMaster versions prior to 7.2.48.11 and those within specific version ranges.
CVE-2024-3544 can be exploited by unauthenticated attackers using SSH private keys to perform unauthorized actions on vulnerable machines.
While the exact exploitation status of CVE-2024-3544 is not publicly detailed, vulnerabilities of this nature typically attract attention from attackers.