Telerik Reporting at Risk of Code Execution Attack Due to Insecure Deserialization Vulnerability
CVE-2024-1801
7.7HIGH
Key Information:
- Vendor
- Progress Software
- Status
- Vendor
- CVE Published:
- 20 March 2024
Badges
πΎ Exploit Existsπ° News Worthy
Summary
The vulnerability identified in Progress Telerik Reporting prior to the 2024 Q1 release (version 18.0.24.130) poses a significant risk due to insecure deserialization. This weakness enables local attackers to exploit the system by potentially executing arbitrary code, leveraging the deserialize mechanism inappropriately. Organizations utilizing affected versions should be aware of the inherent risks and apply necessary security measures to mitigate the threat.
Affected Version(s)
Telerik Reporting Q1 2007
News Articles
References
CVSS V3.1
Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
Low
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
- πΎ
Exploit known to exist
- π°
First article discovered by The Cyber Express
Vulnerability published
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database1 News Article(s)
Credit
HackerOne: 07842c0e165d4d2d8733dd4eab48b3ed0f7afe38 working with Trend Micro Zero Day Initiative