CVE-2025-0556
Published: 12 February 2025
Summary
CVE-2025-0556 is a high-severity Cleartext Transmission of Sensitive Information (CWE-319) vulnerability in Progress Telerik Report Server. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Sniffing (T1040); ranked at the 34.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-13 (Cryptographic Protection) and SC-8 (Transmission Confidentiality and Integrity).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires protection of the confidentiality and integrity of transmitted information, directly mitigating the unencrypted tunnel vulnerable to local network sniffing.
Mandates cryptographic mechanisms to protect communications, addressing the cleartext transmission of information between processes.
Directly requires timely remediation of the identified flaw via vendor upgrade that encrypts the inter-process tunnel.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability exposes inter-process traffic in cleartext on local network, directly enabling passive network sniffing (T1040) by an attacker with local network access.
NVD Description
In Progress® Telerik® Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencrypted tunnel, which can be subjected…
more
to local network traffic sniffing.
Deeper analysisAI
CVE-2025-0556 is a vulnerability in Progress® Telerik® Report Server, affecting versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation. It involves the communication of non-sensitive information between the service agent process and app host process over an unencrypted tunnel, exposing this traffic to local network sniffing. Published on 2025-02-12, the issue is classified under CWE-319 (Cleartext Transmission of Sensitive Information) with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
An attacker with access to the local network can exploit this vulnerability by sniffing the unencrypted traffic between the processes. The attack requires no privileges (PR:N) and has low complexity (AC:L), though it necessitates user interaction (UI:R). Exploitation can result in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H).
The Telerik knowledge base advisory at https://docs.telerik.com/report-server/knowledge-base/kb-security-cleartext-transmission-cve-2025-0556 provides details on mitigation, with upgrading to Telerik Report Server 2025 Q1 (11.0.25.211) or later addressing the unencrypted tunnel issue in the .NET Framework implementation.
Details
- CWE(s)