CVE-2024-7294

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to launch HTTP Denial-of-Service attacks against Progress Telerik Report Server by targeting anonymous endpoints that lack rate limiting. This affects all organizations running vulnerable versions of Telerik Report Server with anonymous access enabled. The attack can exhaust server resources and make the service unavailable.

💻 Affected Systems

Products:
  • Progress Telerik Report Server
Versions: All versions prior to 2024 Q3 (10.2.24.806)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with anonymous endpoints accessible. Authentication requirements reduce exposure.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability for all users, extended downtime, and potential resource exhaustion affecting other services on the same host.

🟠

Likely Case

Service degradation or temporary unavailability for legitimate users during attack periods.

🟢

If Mitigated

Minimal impact with proper rate limiting and monitoring in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

HTTP DoS attacks are well-understood and easy to implement. No authentication required for anonymous endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 Q3 (10.2.24.806) or later

Vendor Advisory: https://docs.telerik.com/report-server/knowledge-base/uncontrolled-resource-consumption-cve-2024-7294

Restart Required: Yes

Instructions:

1. Download Telerik Report Server 2024 Q3 (10.2.24.806) or later. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the Report Server service. 5. Verify functionality.

🔧 Temporary Workarounds

Implement Rate Limiting

all

Configure web server or application firewall to limit requests to anonymous endpoints

Disable Anonymous Access

all

Require authentication for all endpoints if business requirements allow

🧯 If You Can't Patch

  • Implement network-level rate limiting using WAF or load balancer
  • Monitor for unusual traffic patterns and implement automated blocking

🔍 How to Verify

Check if Vulnerable:

Check Report Server version in administration interface or installation directory

Check Version:

Check Telerik Report Server web interface or installation properties

Verify Fix Applied:

Confirm version is 10.2.24.806 or higher and test anonymous endpoint access with rate limiting

📡 Detection & Monitoring

Log Indicators:

  • High volume of requests to anonymous endpoints
  • Increased error rates
  • Resource exhaustion warnings

Network Indicators:

  • Unusually high HTTP request rates from single or multiple sources
  • Pattern of requests to anonymous endpoints

SIEM Query:

source="telerik-report-server" AND (status=429 OR request_count>1000) | stats count by src_ip, endpoint

🔗 References

📤 Share & Export