Cyber Posture

CVE-2025-0556

High

Published: 12 February 2025

Published
12 February 2025
Modified
20 February 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0015 34.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

In Progress® Telerik® Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencrypted tunnel, which can be subjected to local network traffic sniffing.

Security Summary

CVE-2025-0556 is a vulnerability in Progress® Telerik® Report Server, affecting versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation. It involves the communication of non-sensitive information between the service agent process and app host process over an unencrypted tunnel, exposing this traffic to local network sniffing. Published on 2025-02-12, the issue is classified under CWE-319 (Cleartext Transmission of Sensitive Information) with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

An attacker with access to the local network can exploit this vulnerability by sniffing the unencrypted traffic between the processes. The attack requires no privileges (PR:N) and has low complexity (AC:L), though it necessitates user interaction (UI:R). Exploitation can result in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H).

The Telerik knowledge base advisory at https://docs.telerik.com/report-server/knowledge-base/kb-security-cleartext-transmission-cve-2025-0556 provides details on mitigation, with upgrading to Telerik Report Server 2025 Q1 (11.0.25.211) or later addressing the unencrypted tunnel issue in the .NET Framework implementation.

Details

CWE(s)
CWE-319

Affected Products

progress
telerik report server
≤ 11.0.25.211

References