HomeCII/OTProgress resolves critical RCE vulnerability in Telerik Report Server, immediate upgrade required...

Progress resolves critical RCE vulnerability in Telerik Report Server, immediate upgrade required (CVE-2024-6327)

Published on

spot_img

Progress Software has recently addressed a critical vulnerability, identified as CVE-2024-6327, within its Telerik Report Server solution, and is advising all users to upgrade their systems promptly. This vulnerability, if left unpatched, could potentially be exploited by malicious actors to remotely execute code on the affected server.

Telerik Report Server is an essential enterprise tool used for storing, creating, managing, and viewing reports in both web and desktop applications. The specific vulnerability, CVE-2024-6327, is categorized as an insecure deserialization vulnerability, which, when combined with CVE-2024-6096, an insecure type resolution vulnerability affecting Telerik Reporting, poses a significant security risk to users.

CVE-2024-6096 enables attackers to conduct object injection attacks, as highlighted in the report submitted by Markus Wulftange from CODE WHITE GmbH. Fortunately, both vulnerabilities have already been addressed by Progress Software, who made a public disclosure regarding their existence.

To mitigate the risks associated with these vulnerabilities, customers are strongly advised to upgrade to the latest versions of the affected software. Specifically, users should upgrade to Telerik Reporting 2024 Q2 (v18.1.24.709) to eliminate CVE-2024-6096, and to Telerik Report Server 2024 Q2 (10.1.24.709) or newer to address CVE-2024-6327.

In cases where immediate software updates are not feasible, Progress Software recommends users to implement temporary mitigation measures. One such measure involves changing the user associated with the Report Server Application Pool to a profile with limited permissions.

While there have been no reported incidents of the vulnerabilities being exploited in the wild, it is crucial for users to remain vigilant and proactive in securing their systems. Progress Software has a history of being targeted by malicious actors, as evidenced by past incidents involving their software solutions.

For instance, ransomware attackers have previously exploited a zero-day vulnerability in Progress Software’s MOVEit file transfer solution, resulting in severe consequences. Furthermore, vulnerabilities in Progress Software’s Telerik UI component library have been leveraged by attackers to install web shells, underscoring the importance of timely software updates.

Just last month, the Shadowserver Foundation detected exploitation attempts targeting CVE-2024-4358 in conjunction with CVE-2024-1800, allowing threat actors to achieve unauthenticated remote code execution on Progress Telerik Report Servers. These incidents serve as a stark reminder of the ongoing threat landscape and the criticality of maintaining up-to-date software versions.

In conclusion, it is imperative for users of Progress Software’s Telerik Report Server solution to heed the company’s recommendations and promptly upgrade their systems to safeguard against potential security risks. By staying proactive and vigilant, users can enhance the resilience of their systems and protect against potential cyber threats.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...