CVE-2025-3600: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in Progress Software Telerik UI for ASP.NET AJAX
In Progress® Telerik® UI for AJAX, versions 2011.2.712 to 2025.1.218, an unsafe reflection vulnerability exists that may lead to an unhandled exception resulting in a crash of the hosting process and denial of service.
AI Analysis
Technical Summary
CVE-2025-3600 is a high-severity vulnerability identified in Progress Software's Telerik UI for ASP.NET AJAX, affecting versions from 2011.2.712 through 2025.1.218. The vulnerability stems from unsafe reflection, where externally-controlled input is used to select classes or code dynamically. This unsafe reflection can lead to an unhandled exception that causes the hosting process to crash, resulting in a denial of service (DoS) condition. Specifically, the vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption or exhaustion. The CVSS v3.1 base score is 7.5, indicating a high severity level. The vector details show that the attack can be executed remotely over the network (AV:N) with low attack complexity (AC:L), requires no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects availability only (A:H), with no confidentiality or integrity impact. Although no known exploits are reported in the wild yet, the vulnerability could be leveraged by attackers to disrupt services by crashing applications that use the vulnerable Telerik UI components. Since Telerik UI for ASP.NET AJAX is a widely used framework for building rich web applications, this vulnerability poses a significant risk to web services relying on it. The lack of available patches at the time of publication increases the urgency for mitigation through other means.
Potential Impact
For European organizations, this vulnerability could lead to significant service disruptions, especially for those relying on Telerik UI for ASP.NET AJAX in their web applications. The denial of service caused by process crashes can result in downtime, affecting business continuity and potentially leading to financial losses and reputational damage. Critical sectors such as finance, healthcare, government, and e-commerce, which often use ASP.NET AJAX frameworks for interactive web portals, could be particularly impacted. Additionally, the vulnerability does not compromise data confidentiality or integrity but can degrade availability, which in regulated industries may lead to compliance issues. The ease of remote exploitation without authentication or user interaction increases the risk of automated attacks or scanning by malicious actors targeting exposed web applications. Organizations with public-facing web services using the affected Telerik versions are at higher risk, and the impact could cascade if the DoS affects backend systems or dependent services.
Mitigation Recommendations
Given the absence of an official patch at the time of this report, European organizations should implement immediate compensating controls. First, conduct an inventory to identify all instances of Telerik UI for ASP.NET AJAX in use and verify their versions. Where possible, upgrade to a non-vulnerable version once available. Until then, restrict external access to vulnerable web applications using network-level controls such as Web Application Firewalls (WAFs) configured to detect and block suspicious requests that attempt to exploit unsafe reflection patterns. Implement rate limiting and anomaly detection to prevent automated exploitation attempts. Review and harden application input validation to ensure that inputs controlling reflection mechanisms are sanitized and constrained. Monitor application logs for unhandled exceptions or crashes indicative of exploitation attempts. Additionally, consider deploying application-level sandboxing or isolation to limit the impact of crashes on critical services. Engage with Progress Software for updates and patches, and plan for timely deployment once released.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Poland
CVE-2025-3600: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') in Progress Software Telerik UI for ASP.NET AJAX
Description
In Progress® Telerik® UI for AJAX, versions 2011.2.712 to 2025.1.218, an unsafe reflection vulnerability exists that may lead to an unhandled exception resulting in a crash of the hosting process and denial of service.
AI-Powered Analysis
Technical Analysis
CVE-2025-3600 is a high-severity vulnerability identified in Progress Software's Telerik UI for ASP.NET AJAX, affecting versions from 2011.2.712 through 2025.1.218. The vulnerability stems from unsafe reflection, where externally-controlled input is used to select classes or code dynamically. This unsafe reflection can lead to an unhandled exception that causes the hosting process to crash, resulting in a denial of service (DoS) condition. Specifically, the vulnerability is categorized under CWE-400, which relates to uncontrolled resource consumption or exhaustion. The CVSS v3.1 base score is 7.5, indicating a high severity level. The vector details show that the attack can be executed remotely over the network (AV:N) with low attack complexity (AC:L), requires no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact affects availability only (A:H), with no confidentiality or integrity impact. Although no known exploits are reported in the wild yet, the vulnerability could be leveraged by attackers to disrupt services by crashing applications that use the vulnerable Telerik UI components. Since Telerik UI for ASP.NET AJAX is a widely used framework for building rich web applications, this vulnerability poses a significant risk to web services relying on it. The lack of available patches at the time of publication increases the urgency for mitigation through other means.
Potential Impact
For European organizations, this vulnerability could lead to significant service disruptions, especially for those relying on Telerik UI for ASP.NET AJAX in their web applications. The denial of service caused by process crashes can result in downtime, affecting business continuity and potentially leading to financial losses and reputational damage. Critical sectors such as finance, healthcare, government, and e-commerce, which often use ASP.NET AJAX frameworks for interactive web portals, could be particularly impacted. Additionally, the vulnerability does not compromise data confidentiality or integrity but can degrade availability, which in regulated industries may lead to compliance issues. The ease of remote exploitation without authentication or user interaction increases the risk of automated attacks or scanning by malicious actors targeting exposed web applications. Organizations with public-facing web services using the affected Telerik versions are at higher risk, and the impact could cascade if the DoS affects backend systems or dependent services.
Mitigation Recommendations
Given the absence of an official patch at the time of this report, European organizations should implement immediate compensating controls. First, conduct an inventory to identify all instances of Telerik UI for ASP.NET AJAX in use and verify their versions. Where possible, upgrade to a non-vulnerable version once available. Until then, restrict external access to vulnerable web applications using network-level controls such as Web Application Firewalls (WAFs) configured to detect and block suspicious requests that attempt to exploit unsafe reflection patterns. Implement rate limiting and anomaly detection to prevent automated exploitation attempts. Review and harden application input validation to ensure that inputs controlling reflection mechanisms are sanitized and constrained. Monitor application logs for unhandled exceptions or crashes indicative of exploitation attempts. Additionally, consider deploying application-level sandboxing or isolation to limit the impact of crashes on critical services. Engage with Progress Software for updates and patches, and plan for timely deployment once released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- ProgressSoftware
- Date Reserved
- 2025-04-14T16:13:13.173Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0fb1484d88663aeca7e
Added to database: 5/20/2025, 6:59:07 PM
Last enriched: 7/6/2025, 3:57:21 PM
Last updated: 8/15/2025, 11:09:49 AM
Views: 22
Related Threats
CVE-2025-41242: Vulnerability in VMware Spring Framework
MediumCVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.