CVE-2024-56135
Published: 05 February 2025
Summary
CVE-2024-56135 is a high-severity Improper Input Validation (CWE-20) vulnerability in Progress Loadmaster. Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Unix Shell (T1059.004); ranked at the 20.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses the improper input validation (CWE-20) root cause by requiring validation of all user inputs to block OS command injection.
Mandates timely identification, reporting, and remediation of flaws like this CVE through patching as advised by the vendor.
Enforces least privilege to restrict high-privilege (PR:H) access needed for authenticated exploitation of the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection vulnerability directly enables Unix shell command execution (T1059.004) after authentication; also facilitates exploitation of the public-facing LoadMaster application (T1190).
NVD Description
Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection. This issue affects: Product Affected Versions LoadMaster From 7.2.55.0 to 7.2.60.1 (inclusive) From 7.2.49.0 to 7.2.54.12 (inclusive) 7.2.48.12 and all prior versions ECS All prior…
more
versions to 7.2.60.1 (inclusive)
Deeper analysisAI
CVE-2024-56135 is an Improper Input Validation vulnerability (CWE-20) in Progress LoadMaster that enables OS Command Injection by authenticated users. The issue affects LoadMaster versions from 7.2.55.0 to 7.2.60.1 inclusive, from 7.2.49.0 to 7.2.54.12 inclusive, and 7.2.48.12 and all prior versions. It also impacts ECS in all versions prior to 7.2.60.1 inclusive.
Exploitation requires an attacker to have high privileges (PR:H) and adjacent network access (AV:A), with low attack complexity (AC:L) and no user interaction (UI:N). Successful attacks result in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) across a changed scope (S:C), yielding a CVSS v3.1 base score of 8.4.
Mitigation details for CVE-2024-56135 and related vulnerabilities are provided in the Progress advisory at https://community.progress.com/s/article/LoadMaster-Security-Vulnerability-CVE-2024-56131-CVE-2024-56132-CVE-2024-56133-CVE-2024-56134-CVE-2024-56135.
Details
- CWE(s)