
Cloud Vulnerability DB
A community-led vulnerabilities database
Apache Ignite versions from 2.6.0 and before 2.17.0 contain a vulnerability where configured Class Serialization Filters are ignored for some Ignite endpoints. This vulnerability was discovered and reported by zhattatey, with remediation developed by Mikhail Petrov and reviewed by Alex Plehanov (OpenWall).
The vulnerability is related to the deserialization of untrusted data (CWE-502) where Class Serialization Filters are bypassed on certain Ignite endpoints. The severity is rated as CRITICAL with a CVSS 4.0 Base Score of 9.5 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) (NVD).
If successfully exploited, this vulnerability could lead to the execution of arbitrary code on the Apache Ignite server side. The high severity rating indicates potential for significant impact on the confidentiality, integrity, and availability of affected systems (OpenWall).
Users should upgrade to Apache Ignite version 2.17.0 or later which contains the fix for this vulnerability. The issue has been tracked as IGNITE-23594 (OpenWall).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."