CVE-2024-4358
Telerik Report Server vulnerability analysis and mitigation

Overview

A critical authentication bypass vulnerability (CVE-2024-4358) affects Progress Telerik Report Server version 2024 Q1 (10.0.24.305) and earlier versions running on IIS. The vulnerability allows unauthenticated attackers to gain access to restricted functionality within the Telerik Report Server. This vulnerability was discovered by Sina Kheirkhah of Summoning Team and carries a critical CVSS score of 9.8 (Telerik Advisory, Arctic Wolf).

Technical details

The vulnerability is classified as CWE-290 (Authentication Bypass by Spoofing) and enables remote unauthenticated attackers to create administrator users and login to the system. The vulnerability has been described as 'very simple' to exploit and can be used to bypass authentication mechanisms (Hacker News).

Impact

The vulnerability allows attackers to bypass authentication and create rogue administrator accounts, potentially leading to complete system compromise. When chained with another vulnerability (CVE-2024-1800), it could enable remote code execution with elevated privileges (Arctic Wolf, Hacker News).

Mitigation and workarounds

The vulnerability has been patched in Report Server 2024 Q2 (10.1.24.514). As a temporary workaround, organizations can implement a URL Rewrite mitigation technique in IIS to remove the attack surface. This includes installing the URL Rewrite IIS module and creating a request blocking rule for 'startup/register'. Organizations should also review their Report Server's users list for any unauthorized new Local users (Telerik Advisory).

Community reactions

The vulnerability has been added to CISA's Known Exploited Vulnerabilities Catalog, requiring Federal Civilian Executive Branch agencies to remediate it by July 4th, 2024. This addition highlights the severity and potential impact of the vulnerability (CISA).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management