Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Progress Releases Vital Patches for MOVEit and LoadMaster

Progress Releases Vital Patches for MOVEit and LoadMaster

Posted on April 21, 2026 By CWS

On Monday, Progress Software delivered essential updates aimed at addressing several vulnerabilities in their MOVEit WAF and LoadMaster solutions. These vulnerabilities, if left unchecked, could lead to remote code execution (RCE) and operating system command injection, posing significant risks to users.

Details of the Vulnerabilities

The first two vulnerabilities, identified as CVE-2026-3517 and CVE-2026-3519, affect certain APIs in Progress ADC products. Users with ‘Geo Administration’ and ‘VS Administration’ permissions could exploit these flaws to execute arbitrary commands on the LoadMaster appliance. The vulnerabilities arise from insufficient input validation in the ‘addcountry’ and ‘aclcontrol’ commands.

A separate issue, CVE-2026-3518, also impacts the LoadMaster API. An attacker with authenticated access and ‘All’ permissions could leverage the unsanitized input in the ‘killsession’ command to their advantage. This flaw underscores the need for rigorous input sanitization across all command interfaces.

Additional Security Concerns

Another significant security defect, CVE-2026-4048, pertains to the user interface of Progress ADC products. Authenticated attackers with comprehensive permissions could inject malicious code into a custom WAF rule file due to improper input sanitation during file uploads. This vulnerability facilitates command execution, highlighting the critical nature of effective input handling.

Moreover, Progress has addressed CVE-2026-21876, which involves a firewall policy bypass. This flaw allowed a specially crafted multipart request containing an encoded payload to bypass WAF detection due to flawed character set validation logic.

Recommendations and Future Outlook

Progress has released patches in specific versions: MOVEit WAF version 7.2.63.0, LoadMaster GA version 7.2.63.1, LoadMaster LTSF version 7.2.54.17, ECS Connection Manager version 7.2.63.1, and Connection Manager for ObjectScale version 7.2.63.1. Although there have been no reports of these vulnerabilities being exploited in the wild, the company strongly advises its customers to update their systems promptly.

As cybersecurity threats continue to evolve, organizations must stay vigilant and proactive. Keeping systems updated with the latest security patches is crucial in maintaining robust defenses against potential attacks.

Security Week News Tags:API security, Cybersecurity, LoadMaster, MOVEit, OS command injection, Progress Software, RCE, security patches, software update, Vulnerabilities

Post navigation

Previous Post: Boosting MTTR: Key Strategies of Advanced SOCs
Next Post: Phishing Alert: GitHub Notifications Misused by Hackers

Related Posts

Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts Vulnerability Allowed Scraping of 3.5 Billion WhatsApp Accounts Security Week News
M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal $1M WhatsApp Hack Flops: Only Low-Risk Bugs Disclosed to Meta After Pwn2Own Withdrawal Security Week News
NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms Security Week News
BoryptGrab Malware Exploits Over 100 GitHub Repositories BoryptGrab Malware Exploits Over 100 GitHub Repositories Security Week News
Over 370 Organizations Take Part in GridEx VIII Grid Security Exercise Over 370 Organizations Take Part in GridEx VIII Grid Security Exercise Security Week News
The AI Arms Race: Deepfake Generation vs. Detection The AI Arms Race: Deepfake Generation vs. Detection Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • US Cybersecurity Worker Admits Role in Ransomware Scams
  • Google Fixes Antigravity IDE Vulnerability Allowing Code Execution
  • Phishing Alert: GitHub Notifications Misused by Hackers
  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • US Cybersecurity Worker Admits Role in Ransomware Scams
  • Google Fixes Antigravity IDE Vulnerability Allowing Code Execution
  • Phishing Alert: GitHub Notifications Misused by Hackers
  • Progress Releases Vital Patches for MOVEit and LoadMaster
  • Boosting MTTR: Key Strategies of Advanced SOCs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark