CVE-2025-1758
Published: 19 March 2025
Summary
CVE-2025-1758 is a medium-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Progress Multi-Tenant Loadmaster. Its CVSS base score is 4.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked in the top 33.7% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly enforces proper validation of information inputs to prevent buffer overflows from improper input handling in Progress LoadMaster.
SI-16 implements memory protection safeguards that mitigate buffer overflow exploits by preventing unauthorized memory access or manipulation.
SI-2 ensures timely identification, reporting, and patching of flaws like CVE-2025-1758 as detailed in Progress LoadMaster security updates.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow from improper input validation directly enables application/system exploitation to cause endpoint denial of service (low availability impact with no C/I effects).
NVD Description
Improper Input Validation vulnerability in Progress LoadMaster allows : Buffer OverflowThis issue affects: * LoadMaster: 7.2.40.0 and above * ECS: All versions * Multi-Tenancy: 7.1.35.4 and above
Deeper analysisAI
CVE-2025-1758 is an Improper Input Validation vulnerability in Progress LoadMaster that enables a Buffer Overflow, classified under CWE-121. It affects LoadMaster versions 7.2.40.0 and above, all versions of ECS, and Multi-Tenancy versions 7.1.35.4 and above. The vulnerability carries a CVSS v3.1 base score of 4.3 (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L), indicating a moderate severity with primary impact on availability.
An attacker on an adjacent network (AV:A) can exploit this vulnerability with low complexity (AC:L), requiring no privileges (PR:N) or user interaction (UI:N). Exploitation leads to a buffer overflow, resulting in low-impact availability disruption (A:L) with no effects on confidentiality or integrity and unchanged scope (S:U), such as causing partial denial of service on the affected components.
Progress advisories detail mitigations in the security updates section of the LoadMaster 7.2.61.1 release notes, available at https://docs.progress.com/bundle/release-notes_loadmaster-7-2-61-1/page/Security-Updates.html. Practitioners should review these notes for patching instructions and upgrade to addressed versions to remediate the issue.
Details
- CWE(s)