In Progress® Telerik® Reporting versions prior to 2024 Q2 (18.1.24.2.514), a code execution attack is possible by a local threat actor through an insecure deserialization vulnerability.
References
Link | Resource |
---|---|
https://docs.telerik.com/reporting/knowledge-base/deserialization-vulnerability-cve-2024-4200 | Vendor Advisory |
https://docs.telerik.com/reporting/knowledge-base/deserialization-vulnerability-cve-2024-4200 | Vendor Advisory |
Configurations
History
16 Jan 2025, 18:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://docs.telerik.com/reporting/knowledge-base/deserialization-vulnerability-cve-2024-4200 - Vendor Advisory | |
CPE | cpe:2.3:a:progress:telerik_reporting:*:*:*:*:*:*:*:* | |
First Time |
Progress telerik Reporting
Progress |
Information
Published : 2024-05-15 17:15
Updated : 2025-01-16 18:07
NVD link : CVE-2024-4200
Mitre link : CVE-2024-4200
CVE.ORG link : CVE-2024-4200
JSON object : View
Products Affected
progress
- telerik_reporting
CWE
CWE-502
Deserialization of Untrusted Data