Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-yq9y-tdnu-2uc3
Vulnerability ID VCID-yq9y-tdnu-2uc3
Aliases CVE-2017-1000355
GHSA-4466-8jm4-448p
Summary Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an XStream: Java crash when trying to instantiate void/Void.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 5.9 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000355.json
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
epss 0.00429 https://api.first.org/data/v1/epss?cve=CVE-2017-1000355
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-4466-8jm4-448p
cvssv3.1 6.5 https://github.com/jenkinsci/jenkins
generic_textual MODERATE https://github.com/jenkinsci/jenkins
cvssv3.1 6.5 https://github.com/jenkinsci/jenkins/commit/701ea95a52afe53bee28f76a3f96eb0e578852e9
generic_textual MODERATE https://github.com/jenkinsci/jenkins/commit/701ea95a52afe53bee28f76a3f96eb0e578852e9
cvssv3.1 6.5 https://github.com/jenkinsci/jenkins/commit/f7075e60772bd2fa15bcc72450735641c168fed5
generic_textual MODERATE https://github.com/jenkinsci/jenkins/commit/f7075e60772bd2fa15bcc72450735641c168fed5
cvssv3.1 6.5 https://jenkins.io/security/advisory/2017-04-26
generic_textual MODERATE https://jenkins.io/security/advisory/2017-04-26
cvssv3.1 6.5 https://nvd.nist.gov/vuln/detail/CVE-2017-1000355
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2017-1000355
archlinux High https://security.archlinux.org/AVG-255
cvssv3.1 6.5 http://www.securityfocus.com/bid/98066
generic_textual MODERATE http://www.securityfocus.com/bid/98066
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000355.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/jenkinsci/jenkins
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/jenkinsci/jenkins/commit/701ea95a52afe53bee28f76a3f96eb0e578852e9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/jenkinsci/jenkins/commit/f7075e60772bd2fa15bcc72450735641c168fed5
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://jenkins.io/security/advisory/2017-04-26
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2017-1000355
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Found at http://www.securityfocus.com/bid/98066
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.624
EPSS Score 0.00429
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:38:23.164420+00:00 ProjectKB MSRImporter Import https://raw.githubusercontent.com/SAP/project-kb/master/MSR2019/dataset/vulas_db_msr2019_release.csv 38.0.0