Vulnerability Description
Deserialization of Untrusted Data vulnerability in Apache Storm. Versions Affected: before 2.8.6. Description: When processing topology credentials submitted via the Nimbus Thrift API, Storm deserializes the base64-encoded TGT blob using ObjectInputStream.readObject() without any class filtering or validation. An authenticated user with topology submission rights could supply a crafted serialized object in the "TGT" credential field, leading to remote code execution in both the Nimbus and Worker JVMs. Mitigation: 2.x users should upgrade to 2.8.6. Users who cannot upgrade immediately should monkey-patch an ObjectInputFilter allow-list to ClientAuthUtils.deserializeKerberosTicket() restricting deserialized classes to javax.security.auth.kerberos.KerberosTicket and its known dependencies. A guide on how to do this is available in the release notes of 2.8.6. Credit: This issue was discovered by K.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Storm | >= 2.0.0, < 2.8.6 |
Related Weaknesses (CWE)
References
- https://storm.apache.org/2026/04/12/storm286-released.htmlRelease NotesVendor Advisory
- http://www.openwall.com/lists/oss-security/2026/04/12/6Mailing ListThird Party Advisory
FAQ
What is CVE-2026-35337?
CVE-2026-35337 is a vulnerability with a CVSS score of 8.8 (HIGH). Deserialization of Untrusted Data vulnerability in Apache Storm. Versions Affected: before 2.8.6. Description: When processing topology credentials submitted via the Nimbus Thrift API, Storm deseri...
How severe is CVE-2026-35337?
CVE-2026-35337 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-35337?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Storm.