Telerik Reporting at Risk of Code Execution Attack Due to Insecure Deserialization Vulnerability
CVE-2024-1801
7.8HIGH
Key Information:
- Vendor
- Progress Software
- Status
- Vendor
- CVE Published:
- 20 March 2024
Badges
๐พ Exploit Exists๐ฐ News Worthy
Summary
The vulnerability identified in Progress Telerik Reporting prior to the 2024 Q1 release (version 18.0.24.130) poses a significant risk due to insecure deserialization. This weakness enables local attackers to exploit the system by potentially executing arbitrary code, leveraging the deserialize mechanism inappropriately. Organizations utilizing affected versions should be aware of the inherent risks and apply necessary security measures to mitigate the threat.
Affected Version(s)
Telerik Reporting Q1 2007
Get notified when SecurityVulnerability.io launches alerting ๐
Well keep you posted ๐ง
News Articles
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
- ๐พ
Exploit known to exist
- ๐ฐ
First article discovered by The Cyber Express
Vulnerability published
Vulnerability Reserved
Credit
HackerOne: 07842c0e165d4d2d8733dd4eab48b3ed0f7afe38 working with Trend Micro Zero Day Initiative