First published: Wed Mar 20 2024(Updated: )
In Progress® Telerik® Reporting versions prior to 2024 Q1 (18.0.24.130), a code execution attack is possible by a remote threat actor through an insecure deserialization vulnerability.
Credit: security@progress.com
Affected Software | Affected Version | How to fix |
---|---|---|
Progress Telerik Reporting | <18.0.24.130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-1856 is considered high due to its potential for remote code execution.
To fix CVE-2024-1856, update Telerik Reporting to version 18.0.24.130 or later.
CVE-2024-1856 affects all versions of Progress Telerik Reporting prior to 2024 Q1 (18.0.24.130).
Yes, CVE-2024-1856 can be exploited remotely by a threat actor due to an insecure deserialization vulnerability.
Exploitation of CVE-2024-1856 can lead to unauthorized code execution on the affected system.