CVE-2021-41766Deserialization of Untrusted Data in Software Foundation Apache Karaf

Severity
8.1HIGHNVD
EPSS
0.5%
top 34.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 26
Latest updateJan 28

Description

Apache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). JMX is a Java RMI based technology that relies on Java serialized objects for client server communication. Whereas the default JMX implementation is hardened against unauthenticated deserialization attacks, the implementation used by Apache Karaf is not protected against this kind of attack. The impact of Java deserialization vulnerabilities strongly depends on the classes that are

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.2 | Impact: 5.9

Affected Packages2 packages

NVDapache/karaf< 4.3.6
CVEListV5apache_software_foundation/apache_karafApache Karaf4.3.6

🔴Vulnerability Details

3
GHSA
Insecure Java Deserialization in Apache Karaf2022-01-28
OSV
Insecure Java Deserialization in Apache Karaf2022-01-28
CVEList
Insecure Java Deserialization in Apache Karaf2022-01-26

📋Vendor Advisories

1
Red Hat
karaf: insecure java deserialization2022-01-02
CVE-2021-41766 — Deserialization of Untrusted Data | cvebase