TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2021-35464

CRITICALCISA KEV
9.8

Beschreibung

ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht7/22/2021
Zuletzt geandert11/5/2025
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerForgeRock
ProduktAccess Management (AM)
SchwachstellennameForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability
KEV Aufnahmedatum2021-11-03
Behebungsfrist2021-11-17
Ransomware-NutzungKnown

Betroffene Produkte

forgerock:access_managementforgerock:openam

Schwachen (CWE)

CWE-502CWE-502

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.