A critical vulnerability, identified as CVE-2024-7591, has been discovered in Kemp’s LoadMaster Load Balancer that could allow attackers to gain full control of affected systems. This security flaw impacts all LoadMaster versions up to and including 7.2.60.0 and multi-tenant hypervisors up to version 7.1.35.11. The vulnerability resides in the Web User Interface (WUI) of LoadMaster, specifically within the login functionality, which lacks proper input sanitization. As a result, attackers can exploit this flaw remotely without requiring authentication, making it a significant security risk for organizations using the affected versions.
The vulnerability is rooted in the handling of user input during the login process. Security researchers at Insinuator discovered that inadequate input sanitization in the WUI scripts, which are written in BASH, allows attackers to inject arbitrary commands. By exploiting this flaw, attackers can bypass input processing mechanisms and execute commands on the system, potentially gaining complete control over the load balancer. This could have serious consequences, as it could lead to unauthorized access to protected services and exposure of sensitive information.
Once compromised, the load balancer could be used to disrupt network traffic, intercept communications, or further compromise connected systems. The exploitation of this vulnerability could also result in the exposure of sensitive data, as the load balancer often handles traffic for critical services. Given the widespread use of Kemp LoadMaster in enterprise environments, the potential impact of this vulnerability is severe, especially for organizations relying on it for load balancing and traffic management.
Kemp has addressed the issue by releasing fixed versions of LoadMaster and publishing CVE-2024-7591 in September 2024. However, as of the public disclosure on November 27, 2024, organizations using vulnerable versions are strongly urged to update their systems immediately. By applying the security patches, businesses can mitigate the risks associated with this critical vulnerability and protect their networks from potential exploitation.