CVE-2024-8015

9.1 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Progress Telerik Report Server by exploiting insecure type resolution through object injection. Attackers can potentially take full control of affected systems. Organizations using Telerik Report Server versions before 2024 Q3 are affected.

💻 Affected Systems

Products:
  • Progress Telerik Report Server
Versions: All versions prior to 2024 Q3 (10.2.24.924)
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with default configurations are vulnerable. The vulnerability exists in the core reporting functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install malware, steal sensitive data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Attackers gain remote code execution to deploy ransomware, cryptocurrency miners, or establish backdoors for future attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact may be limited to the application server only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access to the Report Server but no authentication. Exploitation is straightforward once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 Q3 (10.2.24.924) or later

Vendor Advisory: https://docs.telerik.com/report-server/knowledge-base/insecure-type-resolution-cve-2024-8015

Restart Required: Yes

Instructions:

1. Download Telerik Report Server 2024 Q3 (10.2.24.924) or later from the Progress website. 2. Backup your current installation and configuration. 3. Run the installer to upgrade. 4. Restart the Report Server service. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Telerik Report Server to only trusted IP addresses and networks

Web Application Firewall Rules

all

Implement WAF rules to block suspicious object serialization patterns

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to the Report Server
  • Deploy a web application firewall with rules specifically targeting object injection attacks

🔍 How to Verify

Check if Vulnerable:

Check the Report Server version in the administration interface or by examining the installed software version

Check Version:

Check the About section in Telerik Report Server web interface or examine the installation directory version files

Verify Fix Applied:

Verify the version is 10.2.24.924 or higher and test that reporting functionality still works properly

📡 Detection & Monitoring

Log Indicators:

  • Unusual serialization/deserialization activity
  • Suspicious .NET type resolution errors
  • Unexpected process creation from Report Server

Network Indicators:

  • Unusual HTTP POST requests to reporting endpoints with serialized objects
  • Outbound connections from Report Server to unexpected destinations

SIEM Query:

source="telerik-report-server" AND (event_type="deserialization" OR process_name="powershell" OR process_name="cmd")

🔗 References

📤 Share & Export