CVE-2021-41766
Java vulnerability analysis and mitigation

Overview

Apache Karaf allows monitoring of applications and the Java runtime by using the Java Management Extensions (JMX). The vulnerability (CVE-2021-41766) was discovered in all versions of Apache Karaf prior to 4.3.6 and was disclosed on January 26, 2022. The issue involves insecure Java deserialization in the JMX implementation used by Apache Karaf, which relies on Java serialized objects for client-server communication. Unlike the default JMX implementation that is hardened against unauthenticated deserialization attacks, the Apache Karaf implementation lacked this protection (Apache Advisory, NVD).

Technical details

The vulnerability stems from the Java Management Extensions (JMX) implementation in Apache Karaf, which uses Java RMI-based technology for client-server communication through serialized objects. The security issue arises from the lack of protection against unauthenticated deserialization attacks in Karaf's JMX implementation. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The impact of this vulnerability depends heavily on the classes available within the target's classpath. While Java deserialization of untrusted data generally represents a high security risk, the actual risk in this case is considered low because Karaf, by default, uses a limited set of classes in the JMX server class path, primarily depending on system-scoped classes (e.g., JAR files in the lib folder) (Apache Advisory).

Mitigation and workarounds

The vulnerability has been fixed in Apache Karaf version 4.3.6 and later. Users are advised to upgrade to version 4.3.6 or later as soon as possible. Alternatively, if immediate upgrading is not possible, users can mitigate the risk by disabling remote access to the JMX server. The fixes are available in repository revisions b42c82c and 93a019c (Apache Advisory).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-66474HIGH8.7
  • JavaJava
  • org.xwiki.rendering:xwiki-rendering-xml
NoYesDec 10, 2025
CVE-2025-66473HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-rest-server
NoYesDec 10, 2025
CVE-2025-67505HIGH8.4
  • JavaJava
  • com.okta.sdk:okta-sdk-root
NoYesDec 10, 2025
CVE-2025-14518MEDIUM5.3
  • JavaJava
  • tech.powerjob:powerjob-common
NoNoDec 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management