CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-10095

Critical Severity
SVRS
84/100

CVSSv3
9.8/10

EPSS
0.00109/1

CVE-2024-10095: Critical code execution vulnerability in Progress Telerik UI for WPF. This vulnerability arises from insecure deserialization, allowing attackers to potentially execute arbitrary code. With an SVRS score of 84, this vulnerability is considered critical and requires immediate attention to mitigate potential risks.

The vulnerability affects versions prior to 2024 Q4 (2024.4.1213). Successful exploitation could lead to complete system compromise and is tagged as being "In The Wild", meaning active exploitation has been observed. Businesses using affected versions of Telerik UI for WPF should upgrade immediately. The combination of high CVSS score (9.8) and SVRS indicates a severe and actively exploited cybersecurity threat.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:N
S:U
C:H
I:H
A:H
2024-12-16

2024-12-18
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-10095 describes an insecure deserialization vulnerability in Progress Telerik UI for WPF versions prior to 2024 Q4 (2024.4.1213). This vulnerability (CWE-502) allows for potential code execution attacks. With a CVSS score of 9.8 and a SOCRadar Vulnerability Risk Score (SVRS) of 84, this vulnerability is considered critical and requires immediate attention. The SVRS highlights the elevated risk based on intelligence from social media, news, code repositories, the dark/deep web, and association with threat actors and malware. The vulnerability is actively exploited by hackers.

Key Insights

  • Critical Severity: The combination of a high CVSS score (9.8) and a very high SVRS (84) signals a significant threat. An SVRS above 80 indicates that the vulnerability is likely being discussed and exploited, making it a high-priority risk.
  • Insecure Deserialization: The root cause is insecure deserialization (CWE-502), a well-known attack vector that allows attackers to inject malicious code during the deserialization process. Exploiting this vulnerability can result in remote code execution on the affected system.
  • Active Exploitation (In The Wild): The "In The Wild" tag clearly indicates that CVE-2024-10095 is actively exploited by hackers, increasing the urgency for remediation. Attackers are actively leveraging this vulnerability in real-world attacks.
  • Exploit Status: Active exploits have been published.

Mitigation Strategies

  • Immediate Patching: Upgrade Telerik UI for WPF to version 2024 Q4 (2024.4.1213) or later as soon as possible. This is the most effective mitigation strategy to address the underlying vulnerability.
  • Input Validation: Implement strict input validation and sanitization on data being deserialized. This can help prevent attackers from injecting malicious code through crafted input. Consider using allowlists to define the acceptable types to be deserialized.
  • Monitor and Alert: Implement robust monitoring and alerting mechanisms to detect suspicious activity related to deserialization processes. Monitor for unexpected process executions or network connections originating from processes using Telerik UI.
  • Web Application Firewall (WAF) Rules: Deploy or update WAF rules to detect and block attempts to exploit insecure deserialization vulnerabilities. WAFs can help to filter malicious input and prevent attacks from reaching the application.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-10095 | Progress Telerik UI for WPF up to 2024.4.1111 deserialization
vuldb.com2024-12-16
CVE-2024-10095 | Progress Telerik UI for WPF up to 2024.4.1111 deserialization | A vulnerability classified as critical has been found in Progress Telerik UI for WPF up to 2024.4.1111. This affects an unknown part. The manipulation leads to deserialization. This vulnerability is uniquely identified as CVE-2024-10095. The attack needs to be approached locally. There is no exploit available. It is recommended to upgrade the affected component.
vuldb.com
rss
forum
news

Social Media

CVE-2024-10095 | Unsafe Deserialization Enables RCE in Telerik UI https://t.co/4pWhZPmbwR
0
1
4
RT @arm1yon: In one of #Telerik's recent updates, I noticed a fix for CVE-2024-10095, an insecure deserialization vulnerability in their UI…
0
8
0
In one of #Telerik's recent updates, I noticed a fix for CVE-2024-10095, an insecure deserialization vulnerability in their UI for WPF. So I thought, what a perfect time for a patch analysis :) Check it out here: https://t.co/01n0v1JiTm
1
0
4
CVE-2024-10095 Code Execution Via Insecure Deserialization in Telerik UI for WPF In Progress Telerik UI for WPF, versions before 2024 Q4 (2024.4.1213), there's an insecure deserialization vulnerability. This can ... https://t.co/VKympUaAwM
0
0
0

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://docs.telerik.com/devtools/wpf/knowledge-base/kb-security-unsafe-deserialization-vulnerability-cve-2024-10095

CWE Details

CWE IDCWE NameDescription
CWE-502Deserialization of Untrusted DataThe application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence