Progress Software discloses maximum severity LoadMaster flaw – here’s what you need to know
The RCE flaw primarily affects Progress Software’s LoadMaster and LoadMaster Multi-Tenant hypervisor software


Progress Software has issued a public notice declaring it has fixed a maximum severity security vulnerability affecting its LoadMaster and LoadMaster Multi-Tenant hypervisor software.
LoadMaster is Progress’ load balancer and application delivery controller (ADC), underpinning high availability, secure, and scalable business applications and websites.
The Multi-Tenant hypervisor, meanwhile, is an iteration of the LoadMaster software that allows users to run multiple load balancer instances on the same piece of hardware.
Disclosed on 4 September, CVE-2024-7591 is a critical improper input validation flaw, rated a maximum ten out of ten on the CVSS.
An unauthenticated remote attacker with access to LoadMaster’s management interface could exploit the vulnerability using a specially-crafted HTTP request and execute arbitrary code on the system.
Progress noted this vulnerability has been closed by “sanitizing request user input to mitigate arbitrary system commands execution”.
The affected products include LoadMaster 7.2.60.0 and all its prior versions, as well as Multi-Tenant 7.1.35.11 and all prior versions.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
A Progress employee confirmed the Long-Term Support (LTS) and Long-term Support with Feature (LTSF) iterations of LoadMaster were also impacted by the issue.
The firm added that its Multi-Tenant software is affected in the following ways.
“The individual instantiated LoadMaster VNFs are vulnerable and must be patched using the add-on listed above as soon as possible,” the bulletin stated. “Note that the MT hypervisor or Manager node is also vulnerable and must be patched using the add-on listed above as soon as possible.”
Progress Software looks to calm user concerns
Progress reassured users it was not aware of any instances of the flaw being exploited in-the-wild, claiming it has not received any reports of direct impact to customers.
RELATED WHITEPAPER
Nevertheless, the firm urged businesses to upgrade their LoadMaster implementations as soon as possible to reduce their exposure.
Progress has released an add-on package XML validation file that it said can be installed on any release of their LoadMaster software, even if support for the specific unit has expired.
It also recommended following its ‘security hardening guidelines’, running through how to configure the software to enhance the security of their business applications.
As one user noted in the comment section on the security bulletin, the add-on mitigating CVE-2024-7591 cannot be installed on the free version of LoadMaster, adding that the version available for download is still vulnerable to this issue.

Solomon Klappholz is a former staff writer for ITPro and ChannelPro. He has experience writing about the technologies that facilitate industrial manufacturing, which led to him developing a particular interest in cybersecurity, IT regulation, industrial infrastructure applications, and machine learning.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd