Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4358: CWE-290 Authentication Bypass by Spoofing in Progress Software Corporation Telerik Report Server

0
Critical
VulnerabilityCVE-2024-4358cvecve-2024-4358cwe-290
Published: Wed May 29 2024 (05/29/2024, 14:51:21 UTC)
Source: CVE Database V5
Vendor/Project: Progress Software Corporation
Product: Telerik Report Server

Description

In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 22:06:46 UTC

Technical Analysis

CVE-2024-4358 is a critical authentication bypass vulnerability identified in Progress Software Corporation's Telerik Report Server, specifically version 2024 Q1 (10.0.24.305) and earlier. The product runs on Microsoft IIS and is used for generating and managing business reports. The vulnerability is classified under CWE-290, indicating an authentication bypass by spoofing. An unauthenticated attacker can exploit this flaw to gain unauthorized access to restricted functionalities of the Telerik Report Server without needing valid credentials or user interaction. The root cause is improper validation of authentication tokens or session management, allowing attackers to bypass the authentication mechanism entirely. This can lead to full compromise of the server’s confidentiality, integrity, and availability, as attackers may view, modify, or delete sensitive report data and potentially pivot within the network. The CVSS v3.1 score is 9.8 (critical), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the severity and ease of exploitation make this a high-priority vulnerability for organizations using Telerik Report Server. The lack of available patches at the time of reporting necessitates immediate interim mitigations to reduce exposure.

Potential Impact

The impact of CVE-2024-4358 is severe for organizations worldwide using Telerik Report Server. Successful exploitation allows attackers to bypass authentication controls, granting unauthorized access to sensitive reporting data and administrative functions. This can lead to data breaches involving confidential business intelligence, financial data, or personally identifiable information. Attackers could also manipulate or delete reports, disrupting business operations and decision-making processes. The vulnerability could serve as a foothold for further lateral movement within enterprise networks, increasing the risk of broader compromise. Given Telerik Report Server’s deployment in sectors such as finance, healthcare, government, and large enterprises, the potential for significant operational disruption, regulatory non-compliance, and reputational damage is high. The ease of exploitation without authentication or user interaction amplifies the threat, making it accessible to a wide range of attackers including opportunistic cybercriminals and advanced persistent threat actors.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations to reduce risk from CVE-2024-4358: 1) Restrict network access to the Telerik Report Server by limiting inbound connections to trusted IP addresses and internal networks only. 2) Deploy a web application firewall (WAF) with custom rules to detect and block suspicious requests targeting authentication endpoints or unusual access patterns. 3) Monitor server logs and network traffic for anomalous activity indicative of authentication bypass attempts, such as repeated access to restricted functions without valid sessions. 4) If feasible, isolate the Telerik Report Server from critical infrastructure and sensitive data stores to contain potential compromise. 5) Disable or remove any unnecessary services or features on the server to reduce the attack surface. 6) Prepare for rapid patch deployment by testing updates in a staging environment and establishing incident response plans specific to this vulnerability. 7) Educate IT and security teams about the vulnerability’s characteristics to improve detection and response capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
ProgressSoftware
Date Reserved
2024-04-30T17:34:38.695Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b5247d717aace26b6b

Added to database: 10/21/2025, 7:06:29 PM

Last enriched: 2/27/2026, 10:06:46 PM

Last updated: 3/24/2026, 12:11:05 PM

Views: 173

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses