CVE-2024-4358:CVE-2024-4358 is an authentication bypass vulnerability in Progress Telerik Report Server, allowing unauthenticated attackers to access restricted functionality.

splash
Back

Description Preview

In Progress Telerik Report Server versions 2024 Q1 (10.0.24.305) and earlier, deployed on IIS, an unauthenticated attacker can exploit an authentication bypass vulnerability. This flaw allows attackers to gain unauthorized access to restricted functionalities of the Telerik Report Server, potentially leading to significant impacts on confidentiality, integrity, and availability.

Overview

  • CVE ID: CVE-2024-4358
  • Vendor: Progress Software Corporation
  • Product: Telerik Report Server
  • Affected Versions: Versions earlier than 10.1.24.514
  • Impact: The vulnerability has a CVSS score of 9.8, classified as critical, indicating high risk due to potential unauthorized access to sensitive functionalities without requiring any privileges or user interaction.
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None

Remediation

To mitigate the risks associated with CVE-2024-4358, users of Telerik Report Server should:

  1. Upgrade to version 10.1.24.514 or later, which addresses the authentication bypass vulnerability.
  2. Review and implement security best practices for web applications, including proper authentication mechanisms and access controls.
  3. Monitor for any unusual activity or unauthorized access attempts on the Telerik Report Server.

References

Early Warning

Customers using Armis Early Warning were notified about this vulnerability before it appeared in CISA's Known Exploited Vulnerabilities Catalog, enabling them to assess their exposure and act proactively. Armis offers these examples of CVEs already included in CISA KEV for potential customers. Click here to learn how to receive alerts earlier.

Armis Alert Date
May 29, 2024
CISA KEV Date
Jun 13, 2024
15days early

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Public Administration: Low
    Public Administration
  2. Accommodation & Food Services: Low
    Accommodation & Food Services
  3. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  4. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  5. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  6. Construction: Low
    Construction
  7. Educational Services: Low
    Educational Services
  8. Finance and Insurance: Low
    Finance and Insurance
  9. Health Care & Social Assistance: Low
    Health Care & Social Assistance
  10. Information: Low
    Information
  11. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  12. Manufacturing: Low
    Manufacturing
  13. Mining: Low
    Mining
  14. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  15. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  16. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  17. Retail Trade: Low
    Retail Trade
  18. Transportation & Warehousing: Low
    Transportation & Warehousing
  19. Utilities: Low
    Utilities
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background