CVE-2024-7294
📋 TL;DR
This vulnerability allows attackers to launch HTTP Denial-of-Service attacks against Progress Telerik Report Server by targeting anonymous endpoints that lack rate limiting. This affects all organizations running vulnerable versions of Telerik Report Server with anonymous access enabled. The attack can exhaust server resources and make the service unavailable.
💻 Affected Systems
- Progress Telerik Report Server
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete service unavailability for all users, extended downtime, and potential resource exhaustion affecting other services on the same host.
Likely Case
Service degradation or temporary unavailability for legitimate users during attack periods.
If Mitigated
Minimal impact with proper rate limiting and monitoring in place.
🎯 Exploit Status
HTTP DoS attacks are well-understood and easy to implement. No authentication required for anonymous endpoints.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2024 Q3 (10.2.24.806) or later
Vendor Advisory: https://docs.telerik.com/report-server/knowledge-base/uncontrolled-resource-consumption-cve-2024-7294
Restart Required: Yes
Instructions:
1. Download Telerik Report Server 2024 Q3 (10.2.24.806) or later. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart the Report Server service. 5. Verify functionality.
🔧 Temporary Workarounds
Implement Rate Limiting
allConfigure web server or application firewall to limit requests to anonymous endpoints
Disable Anonymous Access
allRequire authentication for all endpoints if business requirements allow
🧯 If You Can't Patch
- Implement network-level rate limiting using WAF or load balancer
- Monitor for unusual traffic patterns and implement automated blocking
🔍 How to Verify
Check if Vulnerable:
Check Report Server version in administration interface or installation directory
Check Version:
Check Telerik Report Server web interface or installation properties
Verify Fix Applied:
Confirm version is 10.2.24.806 or higher and test anonymous endpoint access with rate limiting
📡 Detection & Monitoring
Log Indicators:
- High volume of requests to anonymous endpoints
- Increased error rates
- Resource exhaustion warnings
Network Indicators:
- Unusually high HTTP request rates from single or multiple sources
- Pattern of requests to anonymous endpoints
SIEM Query:
source="telerik-report-server" AND (status=429 OR request_count>1000) | stats count by src_ip, endpoint