TROYANOSYVIRUS
Retour aux CVEs

CVE-2021-35464

CRITICALCISA KEV
9.8

Description

ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie7/22/2021
Derniere modification11/5/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurForgeRock
ProduitAccess Management (AM)
Nom vulnerabiliteForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability
Date ajout KEV2021-11-03
Date limite remediation2021-11-17
Utilise dans ransomwareKnown

Produits affectes

forgerock:access_managementforgerock:openam

Faiblesses (CWE)

CWE-502CWE-502

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.