Progress threat watch

Progress CVE coverage for MOVEit, Telerik, OpenEdge, and high-impact enterprise file-transfer or application platforms.

Vendor watch hub

What this page covers

The Progresswatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent Progress activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

15

Active

9

Featured

9

Unique CVEs

15

Most recent entry

Apr 20, 2026, 9:16 AM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent Progress watch items

Showing the 15 most recent items, newest first. Each row links to the official advisory.

15 rows · sorted newest first

Operations view

connection manager for objectscale vulnerability (CVE-2026-4048)

HIGH
watchNVDCVE-2026-4048

OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in a custom WAF rule file during the file upload process.

Apr 20, 2026, 9:16 AMOfficial source

connection manager for objectscale vulnerability (CVE-2026-3519)

HIGH
watchNVDCVE-2026-3519

OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “VS Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'aclcontrol' command

Apr 20, 2026, 9:16 AMOfficial source

connection manager for objectscale vulnerability (CVE-2026-3518)

HIGH
watchNVDCVE-2026-3518

OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'killsession' command

Apr 20, 2026, 9:16 AMOfficial source

connection manager for objectscale vulnerability (CVE-2026-3517)

HIGH
watchNVDCVE-2026-3517

OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “Geo Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'addcountry' command

Apr 20, 2026, 9:16 AMOfficial source

flowmon vulnerability (CVE-2026-3692)

HIGH
watchNVDCVE-2026-3692

In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server.

Apr 2, 2026, 9:16 AMOfficial source

sharefile storage zones controller vulnerability (CVE-2026-2701)

HIGH
watchNVDCVE-2026-2701

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

Apr 2, 2026, 9:16 AMOfficial source

Progress WhatsUp Gold Path Traversal Vulnerability

critical
activeCISA KEVCVE-2024-4885

Progress WhatsUp Gold contains a path traversal vulnerability that allows an unauthenticated attacker to achieve remote code execution.

Mar 2, 2025, 6:00 PMOfficial source

Progress Kemp LoadMaster OS Command Injection Vulnerability

critical
activeCISA KEVCVE-2024-1212

Progress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution.

Nov 17, 2024, 6:00 PMOfficial source

Progress WhatsUp Gold SQL Injection Vulnerability

critical
activeCISA KEVCVE-2024-6670

Progress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user. Known ransomware use: Known.

Sep 15, 2024, 7:00 PMOfficial source

Progress Telerik Report Server Authentication Bypass by Spoofing Vulnerability

critical
activeCISA KEVCVE-2024-4358

Progress Telerik Report Server contains an authorization bypass by spoofing vulnerability that allows an attacker to obtain unauthorized access.

Jun 12, 2024, 7:00 PMOfficial source

Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability

critical
activeCISA KEVCVE-2023-40044

Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system. Known ransomware use: Known.

Oct 4, 2023, 7:00 PMOfficial source

Progress MOVEit Transfer SQL Injection Vulnerability

critical
activeCISA KEVCVE-2023-34362

Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements. Known ransomware use: Known.

Jun 1, 2023, 7:00 PMOfficial source

Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability

critical
activeCISA KEVCVE-2019-18935

Progress Telerik UI for ASP.NET AJAX contains a deserialization of untrusted data vulnerability through RadAsyncUpload which leads to code execution on the server in the context of the w3wp.exe process. Known ransomware use: Known.

Nov 2, 2021, 7:00 PMOfficial source

telerik ui for asp.net ajax vulnerability (CVE-2017-11357)

CRITICAL
activeCISA KEVCVE-2017-11357

Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.

Aug 23, 2017, 12:29 PMOfficial source

sitefinity vulnerability (CVE-2017-9248)

CRITICAL
activeCISA KEVCVE-2017-9248

Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.

Jul 3, 2017, 2:29 PMOfficial source

Related vendors

Other productivity vendors in the radar

Vendor watch FAQ

Common questions

What is the Progress threat watch page?

It is the Progress-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the Progress watch page?

Use it to confirm whether current Progress issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to Progress security issues?

Yes. ITECS can help map Progress advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.