CVE-2018-1295

CRITICAL

Apache Ignite < 2.3.0 - Insecure Deserialization

Title source: rule

Description

In Apache Ignite 2.3 or earlier, the serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to one of the deserialization endpoints of some Ignite components - discovery SPI, Ignite persistence, Memcached endpoint, socket steamer.

Scores

CVSS v3 9.8
EPSS 0.0558
EPSS Percentile 90.2%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502
Status published

Affected Products (2)

apache/ignite < 2.3.0
org.apache.ignite/ignite-core < 2.4Maven

Timeline

Published Apr 02, 2018
Tracked Since Feb 18, 2026