CVE-2024-7292

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to perform credential stuffing attacks against Progress Telerik Report Server by bypassing login attempt restrictions. Attackers can systematically test stolen credentials to gain unauthorized access. Organizations using affected versions of Telerik Report Server are at risk.

💻 Affected Systems

Products:
  • Progress Telerik Report Server
Versions: All versions prior to 2024 Q3 (10.2.24.806)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with authentication enabled. The vulnerability exists in the login mechanism itself.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Report Server with administrative access, leading to data exfiltration, report manipulation, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to sensitive reports and data stored in the Report Server, potentially exposing confidential business information.

🟢

If Mitigated

Limited impact with proper monitoring and alerting on failed login attempts, though some credential testing may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Credential stuffing attacks are well-understood and automated tools exist. No authentication is required to attempt exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 Q3 (10.2.24.806) or later

Vendor Advisory: https://docs.telerik.com/report-server/knowledge-base/improper-restriction-of-excessive-login-attempts-cve-2024-7292

Restart Required: Yes

Instructions:

1. Download the latest version (2024 Q3 or later) from the Telerik website. 2. Backup your current installation and configuration. 3. Run the installer to upgrade. 4. Restart the Report Server service. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Implement Rate Limiting at Network Level

all

Use network appliances or web application firewalls to limit login attempts per IP address

Enable Multi-Factor Authentication

all

Add an additional authentication factor to prevent credential stuffing success

🧯 If You Can't Patch

  • Implement network segmentation to isolate the Report Server from internet access
  • Deploy a web application firewall with rate limiting rules for login endpoints

🔍 How to Verify

Check if Vulnerable:

Check the Report Server version in the administration interface or via the installed files. Versions below 10.2.24.806 are vulnerable.

Check Version:

Check the Telerik Report Server administration dashboard or examine the installation directory for version information.

Verify Fix Applied:

Confirm the version is 10.2.24.806 or higher in the administration interface. Test that login attempts are now properly rate-limited.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts from single IP addresses
  • Unusual login patterns outside business hours
  • Successful logins from previously unknown IPs

Network Indicators:

  • High volume of POST requests to /Account/Login endpoint
  • Traffic patterns consistent with automated credential testing tools

SIEM Query:

source="telerik-report-server" AND (event="login_failed" AND count > 10 within 5 minutes) OR (event="login_successful" AND src_ip NOT IN allowed_ips)

🔗 References

📤 Share & Export