Telerik UI Vulnerability Allows Disk Space Exhaustion Attacks
The National Vulnerability Database has identified a critical vulnerability, CVE-2026-6022, in Infragistics Telerik UI for AJAX. This flaw exists in versions prior to 2026.1.421. Attackers can exploit a missing cumulative size check during file upload reassembly in the RadAsyncUpload component. This allows for uploads to exceed configured limits, leading to disk space exhaustion on the target server.
The CVSS score of 7.5 highlights the high severity of this flaw. The vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H indicates it’s exploitable over the network with no authentication or user interaction required, and the primary impact is on availability (disk space).
Defenders must prioritize patching or updating their Telerik UI for AJAX installations. For organizations unable to patch immediately, implementing strict file upload size validation at the application layer and robust monitoring for unusual disk space consumption are critical mitigation steps.
What This Means For You
- If your organization uses Infragistics Telerik UI for AJAX, immediately investigate versions prior to 2026.1.421. Apply the available patches or upgrade to the fixed version to prevent disk space exhaustion attacks.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-6022 - Telerik UI RadAsyncUpload Chunk Reassembly Disk Exhaustion
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6022 | Vulnerability | CVE-2026-6022 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 22, 2026 at 11:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.