Telerik.Web.UI in Progress Telerik UI for ASP.NET AJAX before R1 2017 and R2 before R2 2017 SP2 uses weak RadAsyncUpload encryption, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0006
https://unit42.paloaltonetworks.com/silent-skimmer-latest-campaign/
https://www.tenable.com/blog/cve-2024-4358-cve-2024-1800-exploit-code-available-for-critical-exploit-chain
https://www.tenable.com/blog/copy-paste-compromises-threat-actors-target-telerik-ui-citrix-sharepoint-cve-2019-18935
http://www.telerik.com/support/kb/aspnet-ajax/upload-%28async%29/details/unrestricted-file-upload
Source: Mitre, NVD
Published: 2017-08-23
Updated: 2025-04-20
Known Exploited Vulnerability (KEV)
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.92834