PatchSiren cyber security CVE debrief
CVE-2024-4358 Progress CVE debrief
CVE-2024-4358 affects Progress Telerik Report Server and is described as an authentication bypass by spoofing issue. CISA added it to the Known Exploited Vulnerabilities catalog on 2024-06-13, which means it is considered actively exploited. The safest defensive response is to follow vendor mitigation guidance immediately; if mitigations are unavailable, CISA advises discontinuing use of the product.
- Vendor
- Progress
- Product
- Telerik Report Server
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2024-06-13
- Original CVE updated
- 2024-06-13
- Advisory published
- 2024-06-13
- Advisory updated
- 2024-06-13
Who should care
Security teams, system administrators, and vulnerability managers responsible for Progress Telerik Report Server deployments should treat this as urgent. Incident response teams should also review exposed instances and authentication-related activity.
Technical summary
The supplied corpus identifies CVE-2024-4358 as a Progress Telerik Report Server authentication bypass by spoofing vulnerability. CISA KEV enrollment on 2024-06-13 indicates known exploitation. The corpus does not provide exploit mechanics, affected version ranges, or a CVSS score; it does state the required defensive action is to apply vendor mitigations or discontinue use if mitigations are unavailable.
Defensive priority
Urgent
Recommended defensive actions
- Inventory all Progress Telerik Report Server deployments and confirm whether any internet-facing or otherwise exposed instances exist.
- Apply the vendor mitigation guidance referenced by CISA as soon as possible.
- If mitigations are unavailable or cannot be applied safely, discontinue use of the product as CISA recommends.
- Review authentication logs and administrative activity for signs of unauthorized access around the KEV date and after.
- Validate the product status against the vendor and NVD records before returning any affected instance to service.
Evidence notes
This debrief is based on the supplied CISA KEV source item and official CVE/NVD/CISA records. The corpus confirms: vendor project Progress, product Telerik Report Server, vulnerability name "Authentication Bypass by Spoofing Vulnerability," KEV dateAdded 2024-06-13, dueDate 2024-07-04, and requiredAction to apply vendor mitigations or discontinue use if mitigations are unavailable. No CVSS score was provided in the supplied data, and knownRansomwareCampaignUse is marked Unknown. The source notes also reference a Progress knowledge base article on registration/auth bypass and the NVD detail page.
Official resources
-
CVE-2024-4358 CVE record
CVE.org
-
CVE-2024-4358 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
CISA publicly listed CVE-2024-4358 in the Known Exploited Vulnerabilities catalog on 2024-06-13, indicating known exploitation. The supplied corpus does not include additional disclosure chronology beyond the public records.