Telerik UI for ASP.NET AJAX contains .NET deserialization vulnerability
CVE-2019-18935

9.8CRITICAL

Key Information:

Vendor

Telerik

Vendor
CVE Published:
11 December 2019

Badges

📈 Score: 108💰 Ransomware👾 Exploit Exists🟡 Public PoC🟣 EPSS 93%🦅 CISA Reported

What is CVE-2019-18935?

CVE-2019-18935 is a vulnerability found in Progress Telerik UI for ASP.NET AJAX, specifically affecting versions up to 2019.3.1023. This product is designed to enhance the user interface of ASP.NET web applications, providing a range of components for developers. The vulnerability centers around a .NET deserialization flaw in the RadAsyncUpload function, which, if exploited, could allow an attacker to execute arbitrary code remotely. This presents a significant risk for organizations as it could lead to unauthorized access, data theft, and disruption of services.

Technical Details

The vulnerability occurs due to improper handling of .NET deserialization in the affected Telerik component. If an attacker possesses the appropriate encryption keys—potentially made accessible through previous vulnerabilities (CVE-2017-11317 or CVE-2017-11357)—they could leverage this flaw to craft malicious payloads. This could lead to the execution of code on the server hosting the application. In newer versions (starting from 2020.1.114), default settings have been adjusted to mitigate the risk, but versions prior to this required specific configuration changes to prevent exploitation.

Potential impact of CVE-2019-18935

  1. Remote Code Execution: Exploitation of this vulnerability allows attackers to execute arbitrary code on the affected server, which can be leveraged to gain full control over the application and its environment.

  2. Data Breaches: Unauthorized access gained through this vulnerability can lead to significant data breaches, where sensitive information can be stolen, compromised, or manipulated.

  3. Operational Disruption: Successful exploitation could enable attackers to disrupt application functionality, resulting in downtime and potential financial loss for organizations reliant on these web applications.

CISA has reported CVE-2019-18935

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2019-18935 as being exploited and is known by the CISA as enabling ransomware campaigns.

The CISA's recommendation is: Apply updates per vendor instructions.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

93% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 💰

    Used in Ransomware

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.