The Progresswatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.
Confirm whether recent Progress activity overlaps with your environment.
Prioritize advisories by MSP-relevance score, severity, and status.
Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.
At a glance
Tracked
15
Active
9
Featured
9
Unique CVEs
15
Most recent entry
Apr 20, 2026, 9:16 AM
Feed refreshes daily · 5:15 a.m. Central
Sources·CISA KEV and NVD (product vendor coverage)
"Most recent entry" is the newest item the upstream feed has published — not our sync time.
Watch items
Recent Progress watch items
Showing the 15 most recent items, newest first. Each row links to the official advisory.
15 rows · sorted newest first
Operations view
connection manager for objectscale vulnerability (CVE-2026-4048)
HIGH
watchNVDCVE-2026-4048
OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in a custom WAF rule file during the file upload process.
connection manager for objectscale vulnerability (CVE-2026-3519)
HIGH
watchNVDCVE-2026-3519
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “VS Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'aclcontrol' command
connection manager for objectscale vulnerability (CVE-2026-3518)
HIGH
watchNVDCVE-2026-3518
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'killsession' command
connection manager for objectscale vulnerability (CVE-2026-3517)
HIGH
watchNVDCVE-2026-3517
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “Geo Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'addcountry' command
In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server.
Progress Kemp LoadMaster OS Command Injection Vulnerability
critical
activeCISA KEVCVE-2024-1212
Progress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution.
Progress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user. Known ransomware use: Known.
Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability
critical
activeCISA KEVCVE-2023-40044
Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system. Known ransomware use: Known.
Progress MOVEit Transfer SQL Injection Vulnerability
critical
activeCISA KEVCVE-2023-34362
Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements. Known ransomware use: Known.
Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability
critical
activeCISA KEVCVE-2019-18935
Progress Telerik UI for ASP.NET AJAX contains a deserialization of untrusted data vulnerability through RadAsyncUpload which leads to code execution on the server in the context of the w3wp.exe process. Known ransomware use: Known.
telerik ui for asp.net ajax vulnerability (CVE-2017-11357)
CRITICAL
activeCISA KEVCVE-2017-11357
Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
connection manager for objectscale vulnerability (CVE-2026-4048)
OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in a custom WAF rule file during the file upload process.
connection manager for objectscale
HIGHCVE-2026-4048
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.1% EPSS.
connection manager for objectscale vulnerability (CVE-2026-3519)
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “VS Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'aclcontrol' command
connection manager for objectscale
HIGHCVE-2026-3519
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.1% EPSS.
connection manager for objectscale vulnerability (CVE-2026-3518)
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'killsession' command
connection manager for objectscale
HIGHCVE-2026-3518
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.1% EPSS.
connection manager for objectscale vulnerability (CVE-2026-3517)
OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “Geo Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'addcountry' command
connection manager for objectscale
HIGHCVE-2026-3517
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.1% EPSS.
In Progress Flowmon versions prior to 12.5.8, a vulnerability exists whereby an authenticated low-privileged user may craft a request during the report generation process that results in unintended commands being executed on the server.
flowmon
HIGHCVE-2026-3692
Watch
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 0.2% EPSS.
Progress Kemp LoadMaster OS Command Injection Vulnerability
Progress Kemp LoadMaster contains an OS command injection vulnerability that allows an unauthenticated, remote attacker to access the system through the LoadMaster management interface, enabling arbitrary system command execution.
Kemp LoadMaster
criticalCVE-2024-1212
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.3% EPSS.
Progress WhatsUp Gold contains a SQL injection vulnerability that allows an unauthenticated attacker to retrieve the user's encrypted password if the application is configured with only a single user. Known ransomware use: Known.
WhatsUp Gold
criticalCVE-2024-6670
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.5% EPSS.
Progress WS_FTP Server Deserialization of Untrusted Data Vulnerability
Progress WS_FTP Server contains a deserialization of untrusted data vulnerability in the Ad Hoc Transfer module that allows an authenticated attacker to execute remote commands on the underlying operating system. Known ransomware use: Known.
WS_FTP Server
criticalCVE-2023-40044
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.4% EPSS.
Progress MOVEit Transfer SQL Injection Vulnerability
Progress MOVEit Transfer contains a SQL injection vulnerability that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database in addition to executing SQL statements that alter or delete database elements. Known ransomware use: Known.
MOVEit Transfer
criticalCVE-2023-34362
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 94.3% EPSS.
Progress Telerik UI for ASP.NET AJAX Deserialization of Untrusted Data Vulnerability
Progress Telerik UI for ASP.NET AJAX contains a deserialization of untrusted data vulnerability through RadAsyncUpload which leads to code execution on the server in the context of the w3wp.exe process. Known ransomware use: Known.
Telerik UI for ASP.NET AJAX
criticalCVE-2019-18935
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 93.6% EPSS.
telerik ui for asp.net ajax vulnerability (CVE-2017-11357)
Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
telerik ui for asp.net ajax
CRITICALCVE-2017-11357
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 93.7% EPSS.
Telerik.Web.UI.dll in Progress Telerik UI for ASP.NET AJAX before R2 2017 SP1 and Sitefinity before 10.0.6412.0 does not properly protect Telerik.Web.UI.DialogParametersEncryptionKey or the MachineKey, which makes it easier for remote attackers to defeat cryptographic protection mechanisms, leading to a MachineKey leak, arbitrary file uploads or downloads, XSS, or ASP.NET ViewState compromise.
sitefinity
CRITICALCVE-2017-9248
Critical
Priority score blends severity, KEV, recency, source signal, and EPSS where available. 88.6% EPSS.
It is the Progress-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.
How should teams use the Progress watch page?
Use it to confirm whether current Progress issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.
Can ITECS help respond to Progress security issues?
Yes. ITECS can help map Progress advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.