Search for vulnerabilities
Vulnerability details: VCID-213j-gkjs-aaab
Vulnerability ID VCID-213j-gkjs-aaab
Aliases CVE-2023-35116
Summary ** DISPUTED ** jackson-databind through 2.15.2 allows attackers to cause a denial of service or other unspecified impact via a crafted object that uses cyclic dependencies. NOTE: the vendor's perspective is that this is not a valid vulnerability report, because the steps of constructing a cyclic data structure and trying to serialize it cannot be achieved by an external attacker.
Status Disputed
Exploitability 0.5
Weighted Severity 6.8
Risk 3.4
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3.1 4.4 https://access.redhat.com/errata/RHSA-2023:5396
ssvc Track https://access.redhat.com/errata/RHSA-2023:5396
cvssv3.1 7.5 https://access.redhat.com/errata/RHSA-2024:2707
ssvc Track https://access.redhat.com/errata/RHSA-2024:2707
cvssv3 4.7 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35116.json
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00043 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00044 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
epss 0.00058 https://api.first.org/data/v1/epss?cve=CVE-2023-35116
cvssv3 4.7 https://nvd.nist.gov/vuln/detail/CVE-2023-35116
cvssv3.1 4.7 https://nvd.nist.gov/vuln/detail/CVE-2023-35116
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2023:5396
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-27T15:51:30Z/ Found at https://access.redhat.com/errata/RHSA-2023:5396
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/errata/RHSA-2024:2707
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-04-22T16:12:35Z/ Found at https://access.redhat.com/errata/RHSA-2024:2707
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35116.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-35116
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-35116
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.01784
EPSS Score 0.00015
Published At April 15, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-04-19T13:00:42.559199+00:00 NVD CVE Status Improver Improve https://cveawg.mitre.org/api/cve/CVE-2023-35116 36.0.0