CVE-2024-10095
CVE-2024-10095: Critical code execution vulnerability in Progress Telerik UI for WPF. This vulnerability arises from insecure deserialization, allowing attackers to potentially execute arbitrary code. With an SVRS score of 84, this vulnerability is considered critical and requires immediate attention to mitigate potential risks.
The vulnerability affects versions prior to 2024 Q4 (2024.4.1213). Successful exploitation could lead to complete system compromise and is tagged as being "In The Wild", meaning active exploitation has been observed. Businesses using affected versions of Telerik UI for WPF should upgrade immediately. The combination of high CVSS score (9.8) and SVRS indicates a severe and actively exploited cybersecurity threat.
Description
CVE-2024-10095 describes an insecure deserialization vulnerability in Progress Telerik UI for WPF versions prior to 2024 Q4 (2024.4.1213). This vulnerability (CWE-502) allows for potential code execution attacks. With a CVSS score of 9.8 and a SOCRadar Vulnerability Risk Score (SVRS) of 84, this vulnerability is considered critical and requires immediate attention. The SVRS highlights the elevated risk based on intelligence from social media, news, code repositories, the dark/deep web, and association with threat actors and malware. The vulnerability is actively exploited by hackers.
Key Insights
- Critical Severity: The combination of a high CVSS score (9.8) and a very high SVRS (84) signals a significant threat. An SVRS above 80 indicates that the vulnerability is likely being discussed and exploited, making it a high-priority risk.
- Insecure Deserialization: The root cause is insecure deserialization (CWE-502), a well-known attack vector that allows attackers to inject malicious code during the deserialization process. Exploiting this vulnerability can result in remote code execution on the affected system.
- Active Exploitation (In The Wild): The "In The Wild" tag clearly indicates that CVE-2024-10095 is actively exploited by hackers, increasing the urgency for remediation. Attackers are actively leveraging this vulnerability in real-world attacks.
- Exploit Status: Active exploits have been published.
Mitigation Strategies
- Immediate Patching: Upgrade Telerik UI for WPF to version 2024 Q4 (2024.4.1213) or later as soon as possible. This is the most effective mitigation strategy to address the underlying vulnerability.
- Input Validation: Implement strict input validation and sanitization on data being deserialized. This can help prevent attackers from injecting malicious code through crafted input. Consider using allowlists to define the acceptable types to be deserialized.
- Monitor and Alert: Implement robust monitoring and alerting mechanisms to detect suspicious activity related to deserialization processes. Monitor for unexpected process executions or network connections originating from processes using Telerik UI.
- Web Application Firewall (WAF) Rules: Deploy or update WAF rules to detect and block attempts to exploit insecure deserialization vulnerabilities. WAFs can help to filter malicious input and prevent attacks from reaching the application.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.