New to Telerik UI for WPF? Download free 30-day trial

Unsafe Deserialization Vulnerability (10012)

Description

Product Alert – November 2024 - CVE-2024-10012

  • Telerik UI for WPF 2024 Q3 (2024.3.924) or earlier.

Issue

CWE-502: Deserialization of Untrusted Data

What Are the Impacts

In Progress® Telerik® UI for WPF versions prior to 2024 Q4 (2024.4.1111), a code execution attack is possible through an insecure deserialization vulnerability when loading external document styles in the RichTextBox.

Solution

We have addressed the issue and the Progress Telerik team strongly recommends performing an upgrade to the latest version listed in the table below.

Current Version Guidance
2024 Q3 (2024.3.924) or earlier Update to 2024 Q4 (2024.4.1111) (update instructions)

All customers who have a Telerik UI for WPF license can access the downloads here Product Downloads | Your Account.

Notes

  • If a project is not using the RichTextBox, the application is not affected by this issue.
  • To check your version of Telerik UI for WPF
    • Via source code: Inspect the Version property of any of the Telerik.Windows.* assembly references in the project.
    • Via deployed application: Locate any Telerik.Windows.*.dll file in the application's directory, right-click, select Properties and view the Version in the Details tab.
  • If you have any questions or concerns related to this issue, open a new Technical Support case in Your Account | Support Center. Technical Support is available to Telerik customers with an active support plan.

External References

CVE-2024-10012 (HIGH)

CVSS: 7.8

In Progress® Telerik® UI for WPF versions prior to 2024 Q4 (2024.4.1111), a code execution attack is possible through an insecure deserialization vulnerability.

In this article