CVE-2024-1212

CRITICAL KEV NUCLEI

Progress Loadmaster < 7.2.48.10 - OS Command Injection

Title source: rule

Description

Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.

Exploits (7)

nomisec WORKING POC 18 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2024-1212
nomisec WRITEUP 1 stars
by Rehan07-Human · poc
https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212
nomisec WORKING POC
by r0otk3r · remote
https://github.com/r0otk3r/CVE-2024-1212
metasploit WORKING POC EXCELLENT
by Dave Yesland with Rhino Security Labs · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/progress_kemp_loadmaster_unauth_cmd_injection.rb
metasploit WORKING POC EXCELLENT
by Dave Yesland with Rhino Security Labs, bwatters-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/progress_kemp_loadmaster_sudo_privesc_2024.rb

Nuclei Templates (1)

Progress Kemp LoadMaster - Command Injection
CRITICALVERIFIEDby DhiyaneshDK
Shodan: html:"LoadMaster"

Scores

CVSS v3 10.0
EPSS 0.9430
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Details

CISA KEV 2024-11-18
VulnCheck KEV 2024-03-29
InTheWild.io 2024-11-18
ENISA EUVD EUVD-2024-16979
CWE
CWE-78
Status published
Products (1)
progress/loadmaster 7.2.48.1 - 7.2.48.10
Published Feb 21, 2024
KEV Added Nov 18, 2024
Tracked Since Feb 18, 2026