CVE-2023-6378

Severity
7.5HIGH
EPSS
0.6%
top 30.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 29
Latest updateJul 2

Description

A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 2.5 | Impact: 4.0

Affected Packages5 packages

NVDqos/logback1.2.01.2.13+2
Mavench.qos.logback:logback-core1.3.01.3.12+2
Mavench.qos.logback:logback-classic1.3.01.3.12+2
Debianlogback< 1:1.2.11-5+1
Ubuntulogback< 1:1.1.3-2ubuntu0.1~esm1+3

🔴Vulnerability Details

6
OSV
logback vulnerabilities2025-07-02
OSV
logback serialization vulnerability2023-11-29
GHSA
logback serialization vulnerability2023-11-29
CVEList
Logback "receiver" DOS vulnerability2023-11-29
OSV
CVE-2023-6378: A serialization vulnerability in logback receiver component part of logback version 12023-11-29

📋Vendor Advisories

5
Ubuntu
logback vulnerabilities2025-07-02
Oracle
Oracle Oracle Communications Applications Risk Matrix: Patch (logback) — CVE-2023-63782024-04-15
Atlassian
CVE-2023-6378: DoS (Denial of Service) ch.qos.logback:logback-core Dependency in Bitbucket Data Center and Server2024-01-16
Red Hat
logback: serialization vulnerability in logback receiver2023-11-29
Debian
CVE-2023-6378: logback - A serialization vulnerability in logback receiver component part of logback ver...2023
CVE-2023-6378 (HIGH CVSS 7.5) | A serialization vulnerability in lo | cvebase.io