|
| 1 | +--- |
| 2 | +title: Unsafe Deserialization Vulnerability (10013) |
| 3 | +description: "How to mitigate CVE-2024-10013, an unsafe deserialization vulnerability." |
| 4 | +slug: unsafe-deserialization-vulnerability-cve-2024-10013 |
| 5 | +tags: common, vulnerability |
| 6 | +res_type: kb |
| 7 | +--- |
| 8 | + |
| 9 | +## Description |
| 10 | + |
| 11 | +Product Alert – November 2024 - [CVE-2024-10013](https://www.cve.org/CVERecord?id=CVE-2024-10013) |
| 12 | + |
| 13 | +- Telerik UI for WinForms 2024 Q3 (2024.3.924) or earlier. |
| 14 | + |
| 15 | +## Issue |
| 16 | + |
| 17 | +CWE-502: Deserialization of Untrusted Data |
| 18 | + |
| 19 | +### What Are the Impacts |
| 20 | + |
| 21 | +In Progress® Telerik® UI for WinForms versions prior to 2024 Q4 (2024.4.1113), a code execution attack is possible through an insecure deserialization vulnerability when loading external document styles for RichTextBox. |
| 22 | + |
| 23 | +## Solution |
| 24 | + |
| 25 | +We have addressed the issue and the Progress Telerik team strongly recommends performing an upgrade to the latest version listed in the table below. |
| 26 | + |
| 27 | +| Current Version | Guidance | |
| 28 | +|-----------------|----------| |
| 29 | +| 2024 Q3 (2024.3.924) or earlier | Update to 2024 Q4 (2024.4.1113) ([update instructions](({%slug how-to-upgrade-a-project%}))) | |
| 30 | + |
| 31 | +All customers who have a Telerik UI for WinForms license can access the downloads here [Product Downloads | Your Account](https://www.telerik.com/account/downloads/product-download?product=RCWF). |
| 32 | + |
| 33 | +## Notes |
| 34 | + |
| 35 | +- If a project is not using the RichTextBox, the application is not affected by this vulnerability. |
| 36 | +- To check your version of Telerik UI for WinForms |
| 37 | + - Via source code: Inspect the Version property of any of the `Telerik.WinControls.*` assembly references in the project. |
| 38 | + - Via deployed application: Locate any `Telerik.WinControls.*.dll` file in the application's directory, right-click, select Properties and view the Version in the Details tab. |
| 39 | +- If you have any questions or concerns related to this issue, open a new Technical Support case in [Your Account | Support Center](https://www.telerik.com/account/support-center/contact-us/). Technical Support is available to Telerik customers with an active support plan. |
| 40 | + |
| 41 | +## External References |
| 42 | + |
| 43 | +[CVE-2024-10013](https://www.cve.org/CVERecord?id=CVE-2024-10013) (HIGH) |
| 44 | + |
| 45 | +**CVSS:** 7.8 |
| 46 | + |
| 47 | +In Progress® Telerik® UI for WinForms versions prior to 2024 Q4 (2024.4.1113), a code execution attack is possible through an insecure deserialization vulnerability. |
0 commit comments