{"vuid":"VU#838200","idnumber":"838200","name":"Telerik Web UI contains cryptographic weakness","keywords":["encryption","Telerik","DNN","DotNetNuke","CWE-326"],"overview":"The Telerik Web UI, versions R2 2017 (2017.2.503) and prior, is vulnerable to a cryptographic weakness which an attacker can exploit to extract encryption keys.","clean_desc":"CWE-326: Inadequate Encryption Strength - CVE-2017-9248\nThe Telerik.Web.UI.dll is vulnerable to a cryptographic weakness which allows the attacker to extract the Telerik.Web.UI.DialogParametersEncryptionKey and/or the MachineKey. Versions R2 2017 (2017.2.503) and prior are vulnerable.","impact":"A remote, unauthenticated attacker could perform arbitrary file upload and downloads, cross-site scripting attacks, leak the MachineKey, or compromise the ASP.NET ViewState. Software vendors who use Telerik web components may also be impacted.","resolution":"Apply an update\nPlease see the Telerik's support article for update information for specific versions. The support article also provides information to those who are unable to update their software.","workarounds":"","sysaffected":"","thanks":"Telerik thanks to Erlend Leiknes, security consultant in Mnemonic AS, and Thanh Van Tien Nguyen for reporting this vulnerability.","author":"This document was written by Trent Novelly.","public":["http://www.telerik.com/blogs/security-alert-for-telerik-ui-for-asp.net-ajax-and-progress-sitefinity","http://www.telerik.com/support/kb/aspnet-ajax/details/cryptographic-weakness","http://www.dnnsoftware.com/community-blog/cid/155436/critical-security-update--june-2017","http://www.dnnsoftware.com/community/security/security-center"],"cveids":["CVE-2017-9248"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2017-06-21T13:32:22Z","publicdate":"2017-06-26T00:00:00Z","datefirstpublished":"2017-07-25T13:39:04Z","dateupdated":"2017-07-25T14:21:55Z","revision":13,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"7.5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvss_temporalscore":"7.5","cvss_environmentalscore":"5.6134943195625","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}