https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
https://ift.tt/prcPCqG How To Prepare For Your Virtual Doctor Visit To Get The Most From Your Consultation
- Get link
- X
- Other Apps
A critical security vulnerability has been discovered in the Progress® Telerik® Report Server, potentially allowing attackers to execute remote code on affected systems. The flaw, identified as CVE-2024-6327, has been assigned a CVSS score of 9.9 out of 10, indicating its severe nature.
The vulnerability affects Progress Telerik Report Server versions before 2024 Q2 (10.1.24.709) and is classified as an insecure deserialization vulnerability (CWE-502). This flaw could enable remote attackers to execute arbitrary code on vulnerable installations, posing a significant risk to organizations using the affected software.
This vulnerability’s primary impact is the potential for remote code execution attacks. Progress Software has released an update to address this critical issue and strongly recommends that all users upgrade to Report Server version 2024 Q2 (10.1.24.709) or later. This update is currently the only comprehensive solution to remove the vulnerability.
Join our free webinar to learn about combating slow DDoS attacks, a major threat today.
A temporary mitigation strategy has been provided for users who are unable to update immediately. This involves changing the user account for the Report Server Application Pool to one with limited permissions. Detailed instructions for this process are available in the Progress Telerik knowledge base.
CURRENT VERSION | GUIDANCE |
---|---|
10.1.24.514 (or earlier) | Update to 10.1.24.709 (update instructions) |
Users can verify their current Report Server version by following these steps:
Customers with an active Telerik Report Server license can access the necessary updates through the Product Downloads section of their Telerik account.
The discovery of this vulnerability highlights the ongoing challenges in software security, particularly in widely used enterprise tools. It reminds us of the importance of regular security updates and the potential risks associated with unpatched systems.
Progress Software has emphasized the critical nature of this update, urging all customers to take immediate action to protect their systems. The company has also acknowledged Markus Wulftange with CODE WHITE GmbH for their cooperation in identifying and addressing this security issue.
As cyber threats continue to evolve, organizations must remain vigilant and prioritize timely security updates to protect their critical infrastructure and data.
Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo
The post Progress Telerik Report Server Flaw Let Attackers Execute Remote Code appeared first on Cyber Security News.
Comments
Post a Comment
Commenter vous !