{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T08:41:32.589","vulnerabilities":[{"cve":{"id":"CVE-2024-6658","sourceIdentifier":"security@progress.com","published":"2024-09-12T15:18:26.543","lastModified":"2025-07-30T16:24:22.697","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.This issue affects:\n\n\n\n Product \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.0 (inclusive) \n\n\n\n\n\n  \n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.11 (inclusive) \n\n\n\n\n\n  \n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.11 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.0 (inclusive)"},{"lang":"es","value":"Vulnerabilidad de validación de entrada incorrecta de usuario autenticado en progreso LoadMaster permite la inyección de comandos del sistema operativo. Este problema afecta a: ?Producto Versiones afectadas LoadMaster De 7.2.55.0 a 7.2.60.0 (inclusive) ? De 7.2.49.0 a 7.2.54.11 (inclusive) ? 7.2.48.12 y todas las versiones anteriores Hipervisor multiinquilino 7.1.35.11 y todas las versiones anteriores ECS Todas las versiones anteriores a 7.2.60.0 (inclusive)"}],"metrics":{"cvssMetricV31":[{"source":"security@progress.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.7,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@progress.com","type":"Secondary","description":[{"lang":"en","value":"CWE-20"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:progress:multi-tenant_loadmaster:*:*:*:*:*:*:*:*","versionEndExcluding":"7.1.35.12","matchCriteriaId":"16086A48-449E-49BB-BE86-C038FFB22C6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*","versionEndIncluding":"7.2.48.12","matchCriteriaId":"8BF6DDA7-65D0-4678-8F19-CAB4A158EA25"},{"vulnerable":true,"criteria":"cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.49.0","versionEndExcluding":"7.2.54.12","matchCriteriaId":"9CEDCF3D-53EA-4DED-B62E-E594BCE165CE"},{"vulnerable":true,"criteria":"cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.55.0","versionEndExcluding":"7.2.60.1","matchCriteriaId":"29576F74-FD49-4181-BA9C-DBD3FC60B0D6"}]}]}],"references":[{"url":"https://support.kemptechnologies.com/hc/en-us/articles/28910587250701","source":"security@progress.com","tags":["Vendor Advisory"]}]}}]}