Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-1801: CWE-502 Deserialization of Untrusted Data in Progress Software Corporation Telerik Reporting

0
High
VulnerabilityCVE-2024-1801cvecve-2024-1801cwe-502
Published: Wed Mar 20 2024 (03/20/2024, 13:12:34 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software Corporation
Product: Telerik Reporting

Description

In Progress® Telerik® Reporting versions prior to 2024 Q1 (18.0.24.130), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.

AI-Powered Analysis

AILast updated: 12/23/2025, 17:11:36 UTC

Technical Analysis

CVE-2024-1801 is a vulnerability classified under CWE-502, indicating insecure deserialization of untrusted data in Progress Software Corporation's Telerik Reporting product versions prior to 2024 Q1 (18.0.24.130). Deserialization vulnerabilities occur when untrusted input is deserialized without proper validation or sanitization, allowing attackers to manipulate serialized objects to execute arbitrary code. In this case, a local threat actor can exploit the vulnerability by providing crafted serialized data to the Telerik Reporting component, leading to code execution. The attack vector is local (AV:L), requiring the attacker to have access to the affected system. The attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is necessary (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H), integrity is low (I:L), and availability is low (A:L), indicating that sensitive data could be exposed, with limited modification and service disruption. No public exploits are known yet, but the vulnerability's nature makes it a significant risk, especially in environments where local access might be possible, such as shared workstations or compromised user accounts. The affected product, Telerik Reporting, is a .NET reporting solution widely used in enterprise environments for generating reports, which may contain sensitive business data. The vulnerability was published on March 20, 2024, and no patches are linked yet, so organizations should monitor vendor updates closely.

Potential Impact

For European organizations, the impact of CVE-2024-1801 can be substantial, especially for enterprises relying on Telerik Reporting for business intelligence and reporting. Successful exploitation could lead to unauthorized code execution on systems running the vulnerable software, potentially exposing sensitive corporate data and intellectual property. The confidentiality impact is high, risking data leaks, while integrity and availability impacts are lower but still present. Given the local attack vector, the threat is more pronounced in environments where internal users or attackers can gain local access, such as through compromised credentials or insider threats. This vulnerability could facilitate lateral movement within networks, increasing the risk of broader compromise. The lack of known exploits in the wild provides a window for proactive defense, but the high CVSS score indicates that once exploited, the consequences could be severe. European organizations with strict data protection regulations (e.g., GDPR) must consider the legal and reputational risks of data breaches stemming from this vulnerability.

Mitigation Recommendations

1. Apply patches or updates from Progress Software Corporation as soon as they become available for Telerik Reporting 2024 Q1 or later versions. 2. Until patches are released, restrict local access to systems running Telerik Reporting to trusted users only, employing strict access controls and monitoring. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious deserialization activities or code execution attempts. 4. Conduct regular audits of user privileges and remove unnecessary local access rights to minimize the attack surface. 5. Use network segmentation to isolate reporting servers from less trusted network zones, limiting lateral movement opportunities. 6. Educate users about the risks of executing untrusted files or interacting with suspicious prompts that could trigger deserialization exploits. 7. Monitor logs and system behavior for anomalies indicative of exploitation attempts, such as unexpected process launches or serialized data handling. 8. Employ runtime application self-protection (RASP) or similar technologies that can detect and prevent insecure deserialization at runtime.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ProgressSoftware
Date Reserved
2024-02-22T20:41:24.875Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69418d769050fe8508ffb31f

Added to database: 12/16/2025, 4:48:54 PM

Last enriched: 12/23/2025, 5:11:36 PM

Last updated: 2/6/2026, 9:15:46 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats