Telerik Report Server RCE Vulnerability: How Hackers Can Create Rogue Admins and Execute Code

Cybersecurity researcher Sina Kheirkhah has demonstrated a chained remote code execution vulnerability on Progress Telerik Report Servers, exploiting an authentication bypass and a deserialization issue. Organizations should urgently update to version 10.1.24.514 to prevent unauthorized admin account creation and arbitrary code execution.

Pro Dashboard

Hot Take:

Looks like the bug hunters have struck gold again, with Progress Telerik Report Servers becoming the latest playground for cyber mischief. Just when you thought your reports were safe, boom! Here comes an RCE vulnerability to spice up your IT life!

Key Points:

  • Researchers demonstrated a chained RCE vulnerability on Progress Telerik Report Servers.
  • The exploit involves two main flaws: CVE-2024-4358 (authentication bypass) and CVE-2024-1800 (deserialization issue).
  • Authentication bypass flaw allows creation of rogue admin accounts.
  • Deserialization issue enables remote code execution via specially crafted XML payloads.
  • Organizations must update to version 10.1.24.514 or later to patch these vulnerabilities.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?