First published: Wed Mar 20 2024(Updated: )
In Progress® Telerik® Reporting versions prior to 2024 Q1 (18.0.24.130), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Telerik Report Server | <18.0.24.130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1801 has a high severity rating due to its potential for code execution by a local threat actor.
To fix CVE-2024-1801, update Progress® Telerik® Reporting to version 2024 Q1 (18.0.24.130) or later.
CVE-2024-1801 affects all versions of Progress® Telerik® Reporting prior to 2024 Q1 (18.0.24.130).
CVE-2024-1801 is classified as an insecure deserialization vulnerability.
No, CVE-2024-1801 requires a local threat actor to exploit the vulnerability.