CVE-2024-1212
CRITICAL KEV NUCLEIProgress Loadmaster < 7.2.48.10 - OS Command Injection
Title source: ruleDescription
Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.
Exploits (7)
nomisec
WRITEUP
1 stars
by Rehan07-Human · poc
https://github.com/Rehan07-Human/Exploiting-RCE-Cyber_Project_CVE-2024-1212
metasploit
WORKING POC
EXCELLENT
by Dave Yesland with Rhino Security Labs · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/progress_kemp_loadmaster_unauth_cmd_injection.rb
metasploit
WORKING POC
EXCELLENT
by Dave Yesland with Rhino Security Labs, bwatters-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/progress_kemp_loadmaster_sudo_privesc_2024.rb
Nuclei Templates (1)
Progress Kemp LoadMaster - Command Injection
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
html:"LoadMaster"
References (5)
Scores
CVSS v3
10.0
EPSS
0.9430
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
CISA KEV
2024-11-18
VulnCheck KEV
2024-03-29
InTheWild.io
2024-11-18
ENISA EUVD
EUVD-2024-16979
CWE
CWE-78
Status
published
Products (1)
progress/loadmaster
7.2.48.1 - 7.2.48.10
Published
Feb 21, 2024
KEV Added
Nov 18, 2024
Tracked Since
Feb 18, 2026