Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-0556
PUBLISHED
More InfoOfficial Page
Assigner-ProgressSoftware
Assigner Org ID-f9fea0b6-671e-4eea-8fde-31911902ae05
View Known Exploited Vulnerability (KEV) details
Published At-12 Feb, 2025 | 15:11
Updated At-12 Feb, 2025 | 15:33
Rejected At-
▼CVE Numbering Authority (CNA)
Telerik Report Server Clear Text Transmission of Agent Commands

In Progress® Telerik® Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencrypted tunnel, which can be subjected to local network traffic sniffing.

Affected Products
Vendor
Progress Software CorporationProgress Software
Product
Telerik Report Server
Modules
  • .NET Framework Implementation
Platforms
  • Windows
Default Status
unaffected
Versions
Affected
  • From 1.0.0 before 2025 Q1 (11.0.25.211) (custom)
Problem Types
TypeCWE IDDescription
CWECWE-319CWE-319: Cleartext Transmission of Sensitive Information
Metrics
VersionBase scoreBase severityVector
3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-158CAPEC-158 Sniffing Network Traffic
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://docs.telerik.com/report-server/knowledge-base/kb-security-cleartext-transmission-cve-2025-0556
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found