CVE-2021-35464

CRITICAL
2021-07-22 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 26, 2026 - 11:19 vuln.today
Added to CISA KEV
Nov 05, 2025 - 19:11 cisa
CISA KEV
PoC Detected
Nov 05, 2025 - 19:11 vuln.today
Public exploit code
CVE Published
Jul 22, 2021 - 18:15 nvd
CRITICAL 9.8

Description

ForgeRock AM server before 7.0 has a Java deserialization vulnerability in the jato.pageSession parameter on multiple pages. The exploitation does not require authentication, and remote code execution can be triggered by sending a single crafted /ccversion/* request to the server. The vulnerability exists due to the usage of Sun ONE Application Framework (JATO) found in versions of Java 8 or earlier

Analysis

ForgeRock AM (Access Management) before version 7.0 contains a Java deserialization vulnerability in the jato.pageSession parameter enabling unauthenticated remote code execution via a single HTTP request.

Technical Context

The CWE-502 deserialization flaw in the jato.pageSession parameter processes untrusted serialized Java objects. ForgeRock AM inherits the Sun ONE/OpenSSO framework's session serialization, which uses Java's default ObjectInputStream without class filtering, allowing gadget chain exploitation.

Affected Products

['ForgeRock AM server before 7.0', 'OpenAM-based deployments']

Remediation

Upgrade to ForgeRock AM 7.0+. Apply the provided security patch for older versions. Monitor for exploitation indicators in access logs (unusual requests to /ccversion/). Restrict access to AM administrative endpoints.

Priority Score

223
Low Medium High Critical
KEV: +50
EPSS: +94.4
CVSS: +49
POC: +20

Share

CVE-2021-35464 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy