First published: Tue Sep 03 2024(Updated: )
An ActiveMQ Discovery service was reachable by default from an OpenEdge Management installation when an OEE/OEM auto-discovery feature was activated. Unauthorized access to the discovery service's UDP port allowed content injection into parts of the OEM web interface making it possible for other types of attack that could spoof or deceive web interface users. Unauthorized use of the OEE/OEM discovery service was remediated by deactivating the discovery service by default.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress OpenEdge Explorer | <=11.7.19 | |
Progress OpenEdge Explorer | >=12.2<=12.2.14 | |
Progress OpenEdge Explorer | >=12.8<12.8.3 |
Use the 12.8.3 or above LTS release where the vulnerability does not exist
Use the 12.2 LTS release at the 12.2.15 Update level or above
Use the 11.7 LTS release at the 11.7.20 Update level or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7654 has a high severity rating due to the potential for unauthorized access and content injection.
To fix CVE-2024-7654, disable the auto-discovery feature in OpenEdge Management and ensure that the UDP port for the ActiveMQ Discovery service is not accessible.
CVE-2024-7654 affects Progress OpenEdge versions up to 11.7.19 and versions 12.2.0 to 12.2.14, as well as certain versions from 12.8.0 to below 12.8.3.
Exploitation of CVE-2024-7654 could allow for unauthorized content injection into the OpenEdge Management web interface.
CVE-2024-7654 is specifically related to the OEE/OEM auto-discovery feature that exposes the ActiveMQ Discovery service.