Vulnerability Note VU#794095
Telerik Analytics Monitor Library allows DLL hijacking
Telerik Analytics Monitor Library is a third-party application analytics service that collects detailed application metrics for vendors. Some versions of the Telerik library allow DLL hijacking, allowing an attacker to load malicious code in the context of the Telerik-based application.
CWE-114: Process Control
Telerik Analytics Monitor Library is supplied as a third-party DLL to be integrated into other software. The library is statically linked with its own build of OpenSSL for supporting HTTPS communication.
An attacker could exploit this situation by providing malicious DLLs, allowing the attacker to load malicious code in the context of the Telerik-based application. The Telerik Analytics Monitor Library has been used in Industrial Control Systems (ICS), which may allow significant access to the ICS if the vulnerability is exploited.
Apply an update
Vendor Information (Learn More)
The Telerik Analytics Monitor Library is included with several industrial control systems (ICS). We will list known ICS vendors affected below, along with Telerik.
|Vendor||Status||Date Notified||Date Updated|
|Elipse||Affected||-||11 Mar 2015|
|Telerik||Affected||-||02 Mar 2015|
CVSS Metrics (Learn More)
ICS-CERT credits Ivan Sanchez from Nullcode Team who identified a process control vulnerability that led to discovery of this issue.
This document was written by Garret Wassermann.
- CVE IDs: CVE-2015-0978
- Date Public: 10 Mar 2015
- Date First Published: 10 Mar 2015
- Date Last Updated: 13 Mar 2015
- Document Revision: 37
If you have feedback, comments, or additional information about this vulnerability, please send us email.