CVE-2019-18935

9.8 CRITICAL CISA KEV - Actively Exploited
Published: December 11, 2019 Modified: November 07, 2025

Description

Progress Telerik UI for ASP.NET AJAX through 2019.3.1023 contains a .NET deserialization vulnerability in the RadAsyncUpload function. This is exploitable when the encryption keys are known due to the presence of CVE-2017-11317 or CVE-2017-11357, or other means. Exploitation can result in remote code execution. (As of 2020.1.114, a default setting prevents the exploit. In 2019.3.1023, but not earlier versions, a non-default setting can prevent exploitation.)

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/bao7uo/RAU_crypto
Source: cve@mitre.org
Exploit Third Party Advisory
https://github.com/noperator/CVE-2019-18935
Source: cve@mitre.org
Exploit Third Party Advisory
https://www.telerik.com/support/whats-new/release-history
Source: cve@mitre.org
Release Notes Vendor Advisory
http://packetstormsecurity.com/files/155720/Telerik-UI-Remote-Code-Execution.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/159653/Telerik-UI-ASP.NET-AJAX-RadAsyncUpload-Deserialization.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory VDB Entry
https://codewhitesec.blogspot.com/2019/02/telerik-revisited.html
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
https://github.com/bao7uo/RAU_crypto
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://github.com/noperator/CVE-2019-18935
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-telerik-ui
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Third Party Advisory
https://www.telerik.com/support/kb/aspnet-ajax/details/allows-javascriptserializer-deserialization
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
https://www.telerik.com/support/whats-new/release-history
Source: af854a3a-2127-422b-91ae-364da2661108
Release Notes Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-18935
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource

21 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
93.5%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-05-03

Weaknesses (CWE)

Affected Vendors

telerik