VYPR
Critical severityNVD Advisory· Published Feb 27, 2018· Updated Sep 17, 2024

CVE-2017-15692

CVE-2017-15692

Description

In Apache Geode before v1.4.0, the TcpServer within the Geode locator opens a network port that deserializes data. If an unprivileged user gains access to the Geode locator, they may be able to cause remote code execution if certain classes are present on the classpath.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Geode locator's TcpServer in versions before 1.4.0 deserializes untrusted data, allowing unprivileged attackers to achieve remote code execution.

Vulnerability

In Apache Geode versions before v1.4.0, the TcpServer component within the Geode locator opens a network port that performs Java deserialization on incoming data [1]. The deserialization occurs without any filtering of permissible classes, making the locator susceptible to a gadget-chain attack if arbitrary classes are present on the classpath [1][2].

Exploitation

An attacker who can reach the Geode locator's network port (typically a TCP port used for internal cluster communication) can send a maliciously crafted serialized Java object. No authentication or special privileges are required beyond network access to the locator [1]. The attacker must craft a payload that, when deserialized, triggers a chain of method invocations from classes already available on the Geode server's classpath [1].

Impact

Successful exploitation leads to remote code execution (RCE) in the context of the Geode locator process. The attacker can execute arbitrary operating system commands or manipulate the Geode cluster, potentially compromising the entire Apache Geode deployment [1]. Confidentiality, integrity, and availability are all at risk.

Mitigation

The issue has been resolved in Apache Geode v1.4.0 [2]. The fix introduces two new properties—serializable-object-filter and validate-serializable-objects—that allow operators to whitelist or blacklist classes for deserialization [2][3]. Users should upgrade to v1.4.0 or later and configure these properties to restrict deserialization to known safe classes [3]. No known workaround exists for versions prior to the fix.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.geode:geode-coreMaven
>= 1.0.0, < 1.4.01.4.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.