Hey there, Telerik Report Server users! It’s time to take action and update your systems pronto! A critical remote code execution (RCE) vulnerability has been patched by the firm, and you don’t want to take any chances.
Urgent: Critical RCE Vulnerability Discovered in Progress Telerik Report Server
Recent reports have unveiled a concerning security flaw in Progress Telerik Report Server, leaving it susceptible to RCE attacks. The vulnerability stemmed from the insecure handling of untrusted data, potentially enabling malicious actors to execute arbitrary code.
The assigned CVE ID for this vulnerability is CVE-2024-6327, carrying a critical severity rating with a CVSS score of 9.9. Technical specifics are still under wraps, with the vulnerability summary awaiting further details.
All versions of Telerik Report Servers, including and prior to 10.1.24.514, are at risk. The good news is that a fix has been rolled out with version 2024 Q2 (10.1.24.709). Make sure to update to this release or a later one to safeguard your system against potential threats.
For those unable to update immediately, Progress suggests a temporary mitigation by altering the permissions of the Report Server Application Pool user.
While there’s no concrete evidence of active exploitation in the wild, history tells us to stay vigilant. Remember the incident with CVE-2024-1800? It didn’t take long for exploits to surface.
Kudos to Markus Wulftange from CODE WHITE GmbH for uncovering this vulnerability. He also flagged another security loophole, CVE-2024-6096, affecting older versions of Progress Telerik Reporting. The firm swiftly addressed this with Reporting 2024 Q2 (18.1.24.709).
We’d love to hear your take on this. Share your thoughts in the comments below!