CVE-2024-1801: CWE-502 Deserialization of Untrusted Data in Progress Software Corporation Telerik Reporting
In Progress® Telerik® Reporting versions prior to 2024 Q1 (18.0.24.130), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.
AI Analysis
Technical Summary
CVE-2024-1801 is a vulnerability classified under CWE-502, indicating insecure deserialization of untrusted data in Progress Software Corporation's Telerik Reporting product versions prior to 2024 Q1 (18.0.24.130). Deserialization vulnerabilities occur when untrusted input is deserialized without proper validation or sanitization, allowing attackers to manipulate serialized objects to execute arbitrary code. In this case, a local threat actor can exploit the vulnerability by providing crafted serialized data to the Telerik Reporting component, leading to code execution. The attack vector is local (AV:L), requiring the attacker to have access to the affected system. The attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is necessary (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H), integrity is low (I:L), and availability is low (A:L), indicating that sensitive data could be exposed, with limited modification and service disruption. No public exploits are known yet, but the vulnerability's nature makes it a significant risk, especially in environments where local access might be possible, such as shared workstations or compromised user accounts. The affected product, Telerik Reporting, is a .NET reporting solution widely used in enterprise environments for generating reports, which may contain sensitive business data. The vulnerability was published on March 20, 2024, and no patches are linked yet, so organizations should monitor vendor updates closely.
Potential Impact
For European organizations, the impact of CVE-2024-1801 can be substantial, especially for enterprises relying on Telerik Reporting for business intelligence and reporting. Successful exploitation could lead to unauthorized code execution on systems running the vulnerable software, potentially exposing sensitive corporate data and intellectual property. The confidentiality impact is high, risking data leaks, while integrity and availability impacts are lower but still present. Given the local attack vector, the threat is more pronounced in environments where internal users or attackers can gain local access, such as through compromised credentials or insider threats. This vulnerability could facilitate lateral movement within networks, increasing the risk of broader compromise. The lack of known exploits in the wild provides a window for proactive defense, but the high CVSS score indicates that once exploited, the consequences could be severe. European organizations with strict data protection regulations (e.g., GDPR) must consider the legal and reputational risks of data breaches stemming from this vulnerability.
Mitigation Recommendations
1. Apply patches or updates from Progress Software Corporation as soon as they become available for Telerik Reporting 2024 Q1 or later versions. 2. Until patches are released, restrict local access to systems running Telerik Reporting to trusted users only, employing strict access controls and monitoring. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious deserialization activities or code execution attempts. 4. Conduct regular audits of user privileges and remove unnecessary local access rights to minimize the attack surface. 5. Use network segmentation to isolate reporting servers from less trusted network zones, limiting lateral movement opportunities. 6. Educate users about the risks of executing untrusted files or interacting with suspicious prompts that could trigger deserialization exploits. 7. Monitor logs and system behavior for anomalies indicative of exploitation attempts, such as unexpected process launches or serialized data handling. 8. Employ runtime application self-protection (RASP) or similar technologies that can detect and prevent insecure deserialization at runtime.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Denmark, Ireland
CVE-2024-1801: CWE-502 Deserialization of Untrusted Data in Progress Software Corporation Telerik Reporting
Description
In Progress® Telerik® Reporting versions prior to 2024 Q1 (18.0.24.130), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-1801 is a vulnerability classified under CWE-502, indicating insecure deserialization of untrusted data in Progress Software Corporation's Telerik Reporting product versions prior to 2024 Q1 (18.0.24.130). Deserialization vulnerabilities occur when untrusted input is deserialized without proper validation or sanitization, allowing attackers to manipulate serialized objects to execute arbitrary code. In this case, a local threat actor can exploit the vulnerability by providing crafted serialized data to the Telerik Reporting component, leading to code execution. The attack vector is local (AV:L), requiring the attacker to have access to the affected system. The attack complexity is low (AC:L), no privileges are required (PR:N), but user interaction is necessary (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact on confidentiality is high (C:H), integrity is low (I:L), and availability is low (A:L), indicating that sensitive data could be exposed, with limited modification and service disruption. No public exploits are known yet, but the vulnerability's nature makes it a significant risk, especially in environments where local access might be possible, such as shared workstations or compromised user accounts. The affected product, Telerik Reporting, is a .NET reporting solution widely used in enterprise environments for generating reports, which may contain sensitive business data. The vulnerability was published on March 20, 2024, and no patches are linked yet, so organizations should monitor vendor updates closely.
Potential Impact
For European organizations, the impact of CVE-2024-1801 can be substantial, especially for enterprises relying on Telerik Reporting for business intelligence and reporting. Successful exploitation could lead to unauthorized code execution on systems running the vulnerable software, potentially exposing sensitive corporate data and intellectual property. The confidentiality impact is high, risking data leaks, while integrity and availability impacts are lower but still present. Given the local attack vector, the threat is more pronounced in environments where internal users or attackers can gain local access, such as through compromised credentials or insider threats. This vulnerability could facilitate lateral movement within networks, increasing the risk of broader compromise. The lack of known exploits in the wild provides a window for proactive defense, but the high CVSS score indicates that once exploited, the consequences could be severe. European organizations with strict data protection regulations (e.g., GDPR) must consider the legal and reputational risks of data breaches stemming from this vulnerability.
Mitigation Recommendations
1. Apply patches or updates from Progress Software Corporation as soon as they become available for Telerik Reporting 2024 Q1 or later versions. 2. Until patches are released, restrict local access to systems running Telerik Reporting to trusted users only, employing strict access controls and monitoring. 3. Implement application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious deserialization activities or code execution attempts. 4. Conduct regular audits of user privileges and remove unnecessary local access rights to minimize the attack surface. 5. Use network segmentation to isolate reporting servers from less trusted network zones, limiting lateral movement opportunities. 6. Educate users about the risks of executing untrusted files or interacting with suspicious prompts that could trigger deserialization exploits. 7. Monitor logs and system behavior for anomalies indicative of exploitation attempts, such as unexpected process launches or serialized data handling. 8. Employ runtime application self-protection (RASP) or similar technologies that can detect and prevent insecure deserialization at runtime.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- ProgressSoftware
- Date Reserved
- 2024-02-22T20:41:24.875Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69418d769050fe8508ffb31f
Added to database: 12/16/2025, 4:48:54 PM
Last enriched: 12/23/2025, 5:11:36 PM
Last updated: 2/6/2026, 9:15:46 PM
Views: 40
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2067: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25581: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in samclarke SCEditor
MediumCVE-2026-25580: CWE-918: Server-Side Request Forgery (SSRF) in pydantic pydantic-ai
HighCVE-2026-25631: CWE-20: Improper Input Validation in n8n-io n8n
MediumCVE-2026-25592: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in microsoft semantic-kernel
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.