PatchSiren cyber security CVE debrief
CVE-2019-18935 Progress CVE debrief
CVE-2019-18935 is a Progress Telerik UI for ASP.NET AJAX vulnerability involving deserialization of untrusted data. CISA has listed it in the Known Exploited Vulnerabilities catalog and marked it as having known ransomware campaign use, which makes it a priority issue for defenders running the affected product.
- Vendor
- Progress
- Product
- Telerik UI for ASP.NET AJAX
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2021-11-03
- Original CVE updated
- 2021-11-03
- Advisory published
- 2021-11-03
- Advisory updated
- 2021-11-03
Who should care
Organizations that use Progress Telerik UI for ASP.NET AJAX, especially teams managing public-facing web applications, application security, vulnerability management, and incident response.
Technical summary
The issue is described as a deserialization of untrusted data vulnerability in Progress Telerik UI for ASP.NET AJAX. Unsafe deserialization flaws can create serious application-compromise risk when an attacker can influence the data being processed. The supplied sources do not include a CVSS score or vendor fix details, but CISA’s KEV listing confirms active exploitation and assigns remediation urgency.
Defensive priority
High. CISA has already cataloged this CVE as known exploited and notes known ransomware campaign use, so affected environments should treat it as an urgent remediation item.
Recommended defensive actions
- Identify whether Progress Telerik UI for ASP.NET AJAX is deployed anywhere in your environment.
- Prioritize patching or upgrading according to vendor instructions.
- Focus first on internet-facing applications and externally reachable systems that use the affected component.
- Validate whether compensating controls, detection, and monitoring are in place until remediation is complete.
- Search for signs of compromise on systems that exposed the vulnerable component, especially where the application is externally accessible.
Evidence notes
The debrief is based only on the supplied CVE record, the CISA Known Exploited Vulnerabilities entry, and the official CVE/NVD resource links provided. The source corpus identifies the product, vulnerability class, KEV status, date added to KEV, due date, and known ransomware campaign use. No CVSS score or vendor remediation version was included in the supplied data, so those details are not asserted here.
Official resources
-
CVE-2019-18935 CVE record
CVE.org
-
CVE-2019-18935 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
CISA added this CVE to the Known Exploited Vulnerabilities catalog on 2021-11-03 and lists a remediation due date of 2022-05-03. The supplied CISA metadata also marks known ransomware campaign use as known.