TROYANOSYVIRUS
Back to CVEs

CVE-2021-35464

CRITICALCISA KEV
9.8

Description

ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier

CVE Details

CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published7/22/2021
Last Modified11/5/2025
Sourcekev
Honeypot Sightings0

CISA KEV

VendorForgeRock
ProductAccess Management (AM)
Vulnerability NameForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability
KEV Date Added2021-11-03
Remediation Due Date2021-11-17
Ransomware UseKnown

Affected Products

forgerock:access_managementforgerock:openam

Weaknesses (CWE)

CWE-502CWE-502

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.