Lucene search

K
vulnrichmentProgressSoftwareVULNRICHMENT:CVE-2024-6096
HistoryJul 24, 2024 - 2:00 p.m.

CVE-2024-6096 Unsafe Deserialization Vulnerability

2024-07-2414:00:19
CWE-470
ProgressSoftware
github.com
2
cve-2024-6096
progress telerik reporting
code execution
object injection
insecure type resolution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

39.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

In Progress® Telerik® Reporting versions prior to 18.1.24.709, a code execution attack is possible through object injection via an insecure type resolution vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:progress:telerik_reporting:1.0.0.0:*:*:*:*:*:*:*"
    ],
    "vendor": "progress",
    "product": "telerik_reporting",
    "versions": [
      {
        "status": "affected",
        "version": "1.0.0.0",
        "lessThan": "18.1.24.709",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.7

Confidence

Low

EPSS

0.001

Percentile

39.4%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-6096