Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Progress Releases Vital Patches for MOVEit and LoadMaster

Progress Releases Vital Patches for MOVEit and LoadMaster

Posted on April 21, 2026 By CWS

On Monday, Progress Software delivered essential updates aimed at addressing several vulnerabilities in their MOVEit WAF and LoadMaster solutions. These vulnerabilities, if left unchecked, could lead to remote code execution (RCE) and operating system command injection, posing significant risks to users.

Details of the Vulnerabilities

The first two vulnerabilities, identified as CVE-2026-3517 and CVE-2026-3519, affect certain APIs in Progress ADC products. Users with ‘Geo Administration’ and ‘VS Administration’ permissions could exploit these flaws to execute arbitrary commands on the LoadMaster appliance. The vulnerabilities arise from insufficient input validation in the ‘addcountry’ and ‘aclcontrol’ commands.

A separate issue, CVE-2026-3518, also impacts the LoadMaster API. An attacker with authenticated access and ‘All’ permissions could leverage the unsanitized input in the ‘killsession’ command to their advantage. This flaw underscores the need for rigorous input sanitization across all command interfaces.

Additional Security Concerns

Another significant security defect, CVE-2026-4048, pertains to the user interface of Progress ADC products. Authenticated attackers with comprehensive permissions could inject malicious code into a custom WAF rule file due to improper input sanitation during file uploads. This vulnerability facilitates command execution, highlighting the critical nature of effective input handling.

Moreover, Progress has addressed CVE-2026-21876, which involves a firewall policy bypass. This flaw allowed a specially crafted multipart request containing an encoded payload to bypass WAF detection due to flawed character set validation logic.

Recommendations and Future Outlook

Progress has released patches in specific versions: MOVEit WAF version 7.2.63.0, LoadMaster GA version 7.2.63.1, LoadMaster LTSF version 7.2.54.17, ECS Connection Manager version 7.2.63.1, and Connection Manager for ObjectScale version 7.2.63.1. Although there have been no reports of these vulnerabilities being exploited in the wild, the company strongly advises its customers to update their systems promptly.

As cybersecurity threats continue to evolve, organizations must stay vigilant and proactive. Keeping systems updated with the latest security patches is crucial in maintaining robust defenses against potential attacks.

Security Week News Tags:API security, Cybersecurity, LoadMaster, MOVEit, OS command injection, Progress Software, RCE, security patches, software update, Vulnerabilities

Post navigation

Previous Post: Boosting MTTR: Key Strategies of Advanced SOCs
Next Post: Phishing Alert: GitHub Notifications Misused by Hackers

Related Posts

Over 300,000 Individuals Impacted by Vitas Hospice Data Breach Over 300,000 Individuals Impacted by Vitas Hospice Data Breach Security Week News
Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data Aflac Finds Suspicious Activity on US Network That May Impact Social Security Numbers, Other Data Security Week News
Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift Security Week News
WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says WhatsApp Takes Down 6.8 Million Accounts Linked to Criminal Scam Centers, Meta Says Security Week News
UK Imposes M Fine on Reddit for Child Data Breaches UK Imposes $20M Fine on Reddit for Child Data Breaches Security Week News
UK Train Operator LNER Warns Customers of Data Breach UK Train Operator LNER Warns Customers of Data Breach Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence
  • Malicious Crypto Apps Target iOS Users on App Store
  • Negotiator Admits Role in 2023 BlackCat Ransomware Scandal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Healthcare Data Breaches Impact 600,000 Individuals
  • New Vulnerabilities in Lantronix and Silex Serial-to-IP Converters
  • Enhancing SOC Maturity with Integrated Threat Intelligence
  • Malicious Crypto Apps Target iOS Users on App Store
  • Negotiator Admits Role in 2023 BlackCat Ransomware Scandal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark