← Back to CVEs
CVE-2021-35464
CRITICALCISA KEV9.8
Description
ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published7/22/2021
Last Modified11/5/2025
Sourcekev
Honeypot Sightings0
CISA KEV
VendorForgeRock
ProductAccess Management (AM)
Vulnerability NameForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability
KEV Date Added2021-11-03
Remediation Due Date2021-11-17
Ransomware UseKnown
Affected Products
forgerock:access_managementforgerock:openam
Weaknesses (CWE)
CWE-502CWE-502
References
http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html(cve@mitre.org)
http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html(cve@mitre.org)
https://bugster.forgerock.org(cve@mitre.org)
http://packetstormsecurity.com/files/163486/ForgeRock-OpenAM-Jato-Java-Deserialization.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/163525/ForgeRock-Access-Manager-OpenAM-14.6.3-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://backstage.forgerock.com/knowledge/kb/article/a47894244(af854a3a-2127-422b-91ae-364da2661108)
https://bugster.forgerock.org(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-35464(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.