<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Telerik — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/telerik/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 22 Apr 2026 08:16:13 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/telerik/feed.xml" rel="self" type="application/rss+xml"/><item><title>Insecure Deserialization Vulnerability in Telerik UI for AJAX RadFilter Control (CVE-2026-6023)</title><link>https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</link><pubDate>Wed, 22 Apr 2026 08:16:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-telerik-rce/</guid><description>An insecure deserialization vulnerability exists in Progress Telerik UI for AJAX's RadFilter control (versions 2024.4.1114 through 2026.1.421) allowing remote code execution via tampering with the filter state exposed to the client.</description><content:encoded><![CDATA[<p>CVE-2026-6023 exposes a critical vulnerability within the RadFilter control of Progress Telerik UI for AJAX. Affecting versions 2024.4.1114 to 2026.1.421, this flaw stems from insecure deserialization practices. The vulnerability arises when the filter state is exposed to the client, enabling malicious actors to manipulate this state. Successful exploitation grants attackers the ability to execute arbitrary code on the server. This vulnerability poses a significant risk to organizations utilizing the affected Telerik UI for AJAX versions, potentially leading to complete system compromise and data breaches. Defenders must promptly address this issue through patching or mitigation strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a web application utilizing a vulnerable version of Progress Telerik UI for AJAX (2024.4.1114 - 2026.1.421) with the RadFilter control enabled.</li>
<li>The attacker observes the RadFilter control&rsquo;s behavior, specifically how filter states are serialized and exposed to the client-side, typically within the HTTP request or response.</li>
<li>The attacker intercepts the serialized filter state data, often Base64 encoded or similar, transmitted between the client and server.</li>
<li>The attacker crafts a malicious serialized payload containing instructions to execute arbitrary code on the server. This involves exploiting the insecure deserialization process.</li>
<li>The attacker replaces the original, legitimate serialized filter state with the malicious payload.</li>
<li>The attacker sends the modified request containing the malicious serialized data to the server.</li>
<li>The Telerik UI for AJAX application on the server attempts to deserialize the tampered data using the RadFilter control.</li>
<li>Due to the insecure deserialization vulnerability, the malicious payload is executed, granting the attacker remote code execution on the server. The attacker can then perform actions such as installing malware, exfiltrating sensitive data, or disrupting services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-6023 can lead to complete compromise of the affected server. An attacker can gain remote code execution, enabling them to install malware, steal sensitive data, or disrupt critical business operations. Given the widespread use of Telerik UI in enterprise applications, this vulnerability could potentially impact a large number of organizations across various sectors. Unpatched systems are at high risk of being exploited, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade Progress Telerik UI for AJAX to a patched version outside the range of 2024.4.1114 through 2026.1.421 to remediate CVE-2026-6023.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Telerik RadFilter Deserialization Attempt</code> to identify attempts to exploit the deserialization vulnerability by monitoring for suspicious HTTP requests targeting the RadFilter control (Log source: webserver).</li>
<li>Implement input validation and sanitization on the server-side to prevent malicious data from being deserialized.</li>
<li>Monitor web server logs for unusual activity related to the RadFilter control, such as requests with abnormally large or malformed serialized data (Log source: webserver).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-6023</category><category>telerik</category><category>deserialization</category><category>rce</category><category>webserver</category></item><item><title>Telerik UI for AJAX RadAsyncUpload Uncontrolled Resource Consumption (CVE-2026-6022)</title><link>https://feed.craftedsignal.io/briefs/2026-04-telerik-resource-exhaustion/</link><pubDate>Wed, 22 Apr 2026 08:16:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-telerik-resource-exhaustion/</guid><description>A vulnerability exists in Progress Telerik UI for AJAX prior to 2026.1.421, RadAsyncUpload, due to missing cumulative size enforcement during chunk reassembly, which allows file uploads to exceed the configured maximum size, leading to disk space exhaustion.</description><content:encoded><![CDATA[<p>Progress Telerik UI for AJAX, a suite of UI components for ASP.NET AJAX, contains an uncontrolled resource consumption vulnerability within the RadAsyncUpload component. This vulnerability, identified as CVE-2026-6022, affects versions prior to 2026.1.421. The vulnerability stems from a failure to properly enforce maximum file size limits during the reassembly of file chunks uploaded via the RadAsyncUpload component. An unauthenticated attacker could exploit this vulnerability by uploading a large file in chunks, bypassing the configured maximum file size restriction. Successful exploitation leads to excessive disk space consumption on the server, potentially causing denial of service.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a web application using a vulnerable version of Progress Telerik UI for AJAX with the RadAsyncUpload component enabled.</li>
<li>The attacker crafts an HTTP request to initiate a file upload to the RadAsyncUpload endpoint.</li>
<li>The attacker splits the malicious file into multiple chunks, each smaller than the initially configured maximum upload size limit.</li>
<li>The attacker sends each chunk to the server using separate HTTP requests to the RadAsyncUpload endpoint.</li>
<li>The server receives the chunks and stores them temporarily, without enforcing the cumulative file size.</li>
<li>Once all chunks are uploaded, the RadAsyncUpload component reassembles the file.</li>
<li>Due to the missing cumulative size check, the reassembled file exceeds the maximum allowed file size.</li>
<li>The server stores the complete, oversized file, leading to disk space exhaustion.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to a denial-of-service condition due to disk space exhaustion. The number of affected systems depends on the usage of the vulnerable Telerik UI for AJAX RadAsyncUpload component. Organizations in any sector using the affected Telerik component are potentially vulnerable. If successful, the attack can cause application downtime, data loss, and require administrative intervention to restore service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Progress Telerik UI for AJAX to version 2026.1.421 or later to patch CVE-2026-6022.</li>
<li>Implement server-side monitoring for excessive disk space usage in directories associated with RadAsyncUpload temporary file storage.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousRadAsyncUploadChunks</code> to detect potential exploitation attempts.</li>
<li>Review and harden file upload size limits to prevent resource exhaustion, as described in the Telerik documentation referenced.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6022</category><category>telerik</category><category>resource-exhaustion</category></item></channel></rss>