Unauthenticated attackers can perform actions, using SSH private keys, by knowing the IP address and having access to the same network of one of the machines in the HA or Cluster group. This vulnerability has been closed by enhancing LoadMaster partner communications to require a shared secret that must be exchanged between the partners before communication can proceed.
                
            Metrics
Affected Vendors & Products
References
        History
                    Mon, 03 Feb 2025 22:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Progress Progress loadmaster | |
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:a:progress:loadmaster:*:*:*:*:ga:*:*:* cpe:2.3:a:progress:loadmaster:*:*:*:*:lts:*:*:* cpe:2.3:a:progress:loadmaster:*:*:*:*:ltsf:*:*:* | |
| Vendors & Products | Progress Progress loadmaster | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: ProgressSoftware
Published: 2024-05-02T14:08:06.683Z
Updated: 2024-08-01T20:12:07.654Z
Reserved: 2024-04-09T18:05:52.839Z
Link: CVE-2024-3544
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T20:12:07.654Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-05-02T15:15:07.053
Modified: 2025-02-03T21:38:22.117
Link: CVE-2024-3544
 Redhat
                        Redhat
                    No data.