CVE-2024-7654

Unauthenticated Content Injection in OpenEdge Management web interface via ActiveMQ discovery service

Description

An ActiveMQ Discovery service was reachable by default from an OpenEdge Management installation when an OEE/OEM auto-discovery feature was activated.  Unauthorized access to the discovery service's UDP port allowed content injection into parts of the OEM web interface making it possible for other types of attack that could spoof or deceive web interface users.   Unauthorized use of the OEE/OEM discovery service was remediated by deactivating the discovery service by default.

Remediation

Solution:

  • Use the 12.8.3 or above LTS release where the vulnerability does not exist
  • Use the 12.2 LTS release at the 12.2.15 Update level or above
  • Use the 11.7 LTS release at the 11.7.20 Update level or above

Category

8.3
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.06%
Vendor Advisory progress.com
Affected: Progress OpenEdge
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-7654?
CVE-2024-7654 has been scored as a high severity vulnerability.
How to fix CVE-2024-7654?
To fix CVE-2024-7654: Use the 12.8.3 or above LTS release where the vulnerability does not exist
Is CVE-2024-7654 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-7654 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-7654?
CVE-2024-7654 affects Progress OpenEdge.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.