CVE-2024-8755

Oct 12, 2024

Published Date: 2024-10-11T15:15:06.150
Last Modified: 2024-10-11T15:15:06.150

CVSS Score: 8.4 (HIGH)

EPSS Score: 0.04%

Risk Score: 5.88 (HIGH)

Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.

Meter Needle
CVSS: 8.4  |  EPSS: 0.04%

Description: Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects:

 Product

Affected Versions

LoadMaster

From 7.2.55.0 to 7.2.60.1 (inclusive)

  

From 7.2.49.0 to 7.2.54.12 (inclusive)

  

7.2.48.12 and all prior versions

Multi-Tenant Hypervisor

7.1.35.12 and all prior versions

ECS

All prior versions to 7.2.60.1 (inclusive)

Mitre ATT&CK Technical v15.1

T1062 – Hypervisor
T1053.002 – At

Technical Analysis & Mitigation Measures

1. Technical Attack Analysis:

– Attack Techniques :
– OS Command Injection : This vulnerability allows an attacker to execute arbitrary commands on the host operating system through improperly validated input. It can be exploited by sending specially crafted requests that include malicious commands.
– Hypervisor Exploitation (T1062) : If the vulnerability is exploited on a multi-tenant hypervisor, it could lead to unauthorized access to virtual machines hosted on the hypervisor, potentially compromising other tenants’ data.
– Scheduled Task/Job Manipulation (T1053.002) : An attacker could create or modify scheduled tasks to maintain persistence or perform malicious activities at scheduled intervals.

– Possible Outcomes of Exploitation :
– Unauthorized access to the underlying operating system, leading to data breaches or service disruptions.
– Compromise of additional virtual machines if the hypervisor is exploited, allowing lateral movement within the infrastructure.
– Execution of malicious scripts or commands that could escalate privileges, install backdoors, or exfiltrate sensitive data.

2. Mitigation Measures:
– Validate and sanitize all user inputs.
– Implement least privilege access controls.
– Regularly update and patch affected systems to the latest versions.
– Monitor and log all command execution events.
– Employ an intrusion detection system (IDS) to identify anomalous activities.
– Limit access to the hypervisor and sensitive components to authorized personnel only.
– Use web application firewalls (WAF) to filter and monitor HTTP requests.
– Conduct regular security assessments and penetration testing.
– Educate users on secure coding practices to prevent input validation issues.

The content above is generated by AI. Please review and consider carefully before applying!

Reference Links

Vendor - Produce - Version

None

Disclaimer

The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.