Kemp LoadMaster Vulnerability: Authenticated RCE Found in customLocation Parameter

Advisory ZDI-26-319 reveals a command injection flaw in Progress Software’s Kemp LoadMaster. Authenticated users can exploit the customLocation parameter to ac…

Kemp LoadMaster Vulnerability: Authenticated RCE Found in customLocation Parameter

On May 21, 2026, Trend Micro’s Zero Day Initiative (ZDI) published advisory ZDI-26-319, documenting a remote code execution (RCE) vulnerability in Progress Software’s Kemp LoadMaster. The flaw stems from the handling of the customLocation parameter, allowing an authenticated attacker to inject commands into the underlying operating system. While Progress Software has released a corrective update, the nature of the product—a perimeter load balancer often exposed to internal networks or administrative interfaces—makes this a high-priority incident for infrastructure security teams.

Key Takeaways
  • ZDI-26-319 affects Progress Software’s Kemp LoadMaster: RCE via command injection in the customLocation parameter.
  • The attack requires authentication (CVSS vector PR:L) but no user interaction, featuring low attack complexity and high impact on confidentiality, integrity, and availability.
  • The CVSS score is 8.8: Remote attack possible, scope unchanged, with maximum consequences across all three security pillars.
  • Progress Software has issued an update; affected versions and a specific CVE identifier have not yet been confirmed by independent sources.

The Mechanism: From Hidden Parameter to System Shell

This vulnerability is not found in a publicly exposed service nor does it require a complex exploit chain. Instead, the danger arises from an internal validation error. The customLocation parameter, used within the appliance’s configuration, is passed to a system call without adequate sanitization of the user-supplied string. This oversight facilitates command injection, enabling an authenticated attacker to execute arbitrary payloads with the privileges of the listening process.

According to the Zero Day Initiative advisory, "the vulnerability allows remote attackers to execute arbitrary code on vulnerable installations." While the requirement for authentication narrows the threat pool, it does not eliminate the risk: compromised administrators, low-privileged accounts with panel access, or previously stolen credentials remain viable vectors. The product’s role amplifies the risk; Kemp LoadMaster manages incoming traffic, terminates TLS sessions, and balances backend loads. An attacker with a shell on the appliance gains visibility into active connections, certificates, and internal network topology.

Risk Assessment: Deconstructing the 8.8 Rating

The complete CVSS3 vector—AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H—warrants a detailed breakdown. A Network vector (AV:N) means no physical presence or local network access is required. Low complexity (AC:L) indicates the exploit does not rely on specialized conditions or race conditions. Low privileges (PR:L) require a valid account, though not necessarily an administrative one, and zero user interaction (UI:N) allows the exploit to be automated. While the unchanged scope (S:U) limits propagation to the compromised system itself, the impact on confidentiality, integrity, and availability is rated as High (H/H/H), as RCE theoretically permits any subsequent operation.

An 8.8 score places the vulnerability in the "High" range, just below the "Critical" threshold (9.0-10.0). However, for a perimeter asset like a load balancer, this numerical distinction is thin. Unlike an internal database with restricted access, this component interacts by definition with external-to-internal traffic. While rigorous segmentation of management interfaces can reduce exposure, historical incident data suggests such segmentation is frequently incomplete.

«The specific flaw exists within handling of the customLocation parameter. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call.» — Zero Day Initiative, ZDI-26-319

Reporting Gaps: Limitations of the Primary Source

The ZDI advisory currently serves as the sole primary source. This necessitates caution regarding details that typically complete the technical picture. No CVE identifier has been confirmed for ZDI-26-319, nor have the specific affected versions of Kemp LoadMaster or the exact patched release numbers been publicly detailed. Progress Software has not yet issued a corresponding public advisory. While there is no evidence of active exploitation in the wild, this should not be taken as a negative proof; the coordinated disclosure on May 21, 2026, may precede observable threat actor activity.

One notable discrepancy: the ZDI advisory title references "addcountry," while the technical description identifies customLocation as the vulnerable parameter. Without independent confirmation, it remains unclear if "addcountry" refers to an endpoint, a related function, or an editorial leftover. Our technical analysis focuses on customLocation as the only verified component. Organizations seeking the update should consult Progress Software documentation directly to match the ZDI advisory with specific product release notes.

Mitigation and Response Steps

Priority actions for teams managing Kemp LoadMaster deployments should focus on four concrete steps:

1. Verify Update Deployment. Progress Software has released a patch; the immediate priority is confirming whether production environments have incorporated it. In the absence of detailed release notes, direct contact with vendor support or a review of the appliance changelog is necessary to map installed versions against the fix.

2. Isolate Management Interfaces. Since the attack vector requires authentication, any measure restricting access to the management panel reduces the attack surface. This includes using dedicated VPNs, physically or virtually isolated management networks, source IP whitelisting, and mandatory multi-factor authentication (MFA) for all administrative accounts.

3. Audit Credential Management. Because the PR:L rating lowers the barrier to any valid account, admins should audit existing users, remove dormant accounts, force password rotations, and ensure no administrative credentials have been leaked in previous third-party breaches.

4. Monitor for Execution Anomalies. Unusual system logs, uncharacteristic outbound connections from the load balancer, or unauthorized changes to customLocation configurations should trigger an investigation. A successful command injection could allow an attacker to establish persistence far beyond the initial payload.

Strategic Impact: The Risk of a Compromised Load Balancer

Compromising a Kemp LoadMaster is not equivalent to breaching a standard application server. The appliance sits at the architectural boundary between the internet and the internal network. It sees decrypted traffic after TLS termination, routes requests to backends, and manages session persistence. An attacker with control at this level can redirect traffic to malicious systems, intercept user sessions, or degrade the availability of all exposed services. The authenticated RCE in ZDI-26-319 is not an isolated incident; it is a potential pivot point in a broader attack chain.

The most concerning factor remains the low attack complexity. No exploit chain or sandbox bypass is required—only a poorly validated parameter and a single compromised account. While a patch exists, the window between disclosure and mass application often spans weeks or months. For load balancers, that delay represents a period where an attacker can operate invisibly at the heart of the traffic flow.

Frequently Asked Questions

Why does the ZDI title mention "addcountry" but the text refers to customLocation?

This is an unresolved discrepancy in the primary source. While the title of ZDI-26-319 mentions "addcountry," the technical section explicitly describes command injection in the customLocation parameter. Until Progress Software or independent binary analysis clarifies the relationship, administrators should monitor both references when verifying patches.

Can this vulnerability be exploited without valid credentials?

No, according to the primary source. The CVSS vector indicates PR:L (Privileges Low), and the ZDI text explicitly states that "Authentication is required to exploit this vulnerability." No variants or bypasses have been documented at this time.

Is the update sufficient, or are further countermeasures needed?

The patch addresses the specific vulnerability. However, the risk profile—where authentication is the only prerequisite for system-level execution via a configuration parameter—suggests that updates should be coupled with hardened administrative access and continuous monitoring. History shows that similar classes of flaws often recur in code areas with historically weak input validation.

Sources

Information has been verified against cited sources and is current at the time of publication.