Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33701: CWE-502: Deserialization of Untrusted Data in open-telemetry opentelemetry-java-instrumentation

0
Critical
VulnerabilityCVE-2026-33701cvecve-2026-33701cwe-502
Published: Fri Mar 27 2026 (03/27/2026, 00:01:12 UTC)
Source: CVE Database V5
Vendor/Project: open-telemetry
Product: opentelemetry-java-instrumentation

Description

CVE-2026-33701 is a critical remote code execution vulnerability in open-telemetry's Java instrumentation versions prior to 2. 26. 1. It arises from unsafe deserialization of untrusted data via a custom RMI endpoint registered by the instrumentation on Java 16 and earlier. Exploitation requires three conditions: the Java agent attached, a network-accessible JMX/RMI port configured, and a gadget-chain-compatible library on the classpath. Successful exploitation allows an attacker with network access to execute arbitrary code with the JVM process privileges without authentication or user interaction. Systems running JDK 17 or later are not vulnerable, but upgrading is recommended. Mitigation includes upgrading to version 2. 26. 1 or later or disabling RMI integration via a system property.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 01:00:05 UTC

Technical Analysis

CVE-2026-33701 is a deserialization vulnerability classified under CWE-502 affecting open-telemetry's Java instrumentation library versions before 2.26.1. The vulnerability stems from the RMI instrumentation component registering a custom endpoint that deserializes incoming data without applying serialization filters, allowing untrusted data to be processed. This flaw exists on Java Development Kit (JDK) versions 16 and earlier. An attacker with network access to a configured JMX or RMI port on a JVM running the vulnerable instrumentation can exploit this to achieve remote code execution (RCE). Exploitation requires three conditions: (1) the OpenTelemetry Java instrumentation is attached as a Java agent via the -javaagent option, (2) the JMX/RMI port is explicitly configured and network-reachable using the -Dcom.sun.management.jmxremote.port system property, and (3) a gadget-chain-compatible library is present on the JVM classpath to facilitate deserialization attacks. The vulnerability allows arbitrary code execution with the privileges of the JVM process owner, without requiring authentication or user interaction. For JDK 17 and above, this vulnerability does not apply, but upgrading the instrumentation library is still advised. The recommended mitigation for affected environments running JDK 16 or earlier is to upgrade to open-telemetry-java-instrumentation version 2.26.1 or later. Alternatively, disabling the RMI integration by setting the system property -Dotel.instrumentation.rmi.enabled=false can serve as a temporary workaround. No known exploits have been reported in the wild as of the publication date. The CVSS v4.0 score is 9.3 (critical), reflecting the high impact and ease of exploitation.

Potential Impact

This vulnerability enables unauthenticated remote attackers with network access to a JVM's JMX/RMI port to execute arbitrary code with the same privileges as the JVM process. This can lead to full system compromise, data theft, service disruption, or lateral movement within an organization's network. Since OpenTelemetry is widely used for monitoring and telemetry in Java applications, especially in cloud-native and enterprise environments, vulnerable systems exposing JMX/RMI ports are at significant risk. The impact is amplified in environments where JVMs run with elevated privileges or handle sensitive data. Exploitation requires no user interaction or authentication, increasing the threat level. Organizations relying on Java 16 or earlier and using OpenTelemetry instrumentation with exposed JMX/RMI ports must consider this vulnerability critical to their security posture.

Mitigation Recommendations

1. Upgrade open-telemetry-java-instrumentation to version 2.26.1 or later immediately on all affected systems running JDK 16 or earlier. 2. If immediate upgrade is not feasible, disable the RMI instrumentation by setting the JVM system property -Dotel.instrumentation.rmi.enabled=false to prevent the vulnerable deserialization endpoint from being active. 3. Restrict network access to JMX/RMI ports using firewall rules or network segmentation to limit exposure only to trusted management hosts. 4. Avoid running JVM processes with unnecessary elevated privileges to reduce the impact of potential exploitation. 5. Remove any unnecessary gadget-chain-compatible libraries from the classpath to reduce the risk of deserialization gadget exploitation. 6. Monitor network traffic and logs for unusual activity targeting JMX/RMI ports. 7. For environments running JDK 17 or later, ensure OpenTelemetry instrumentation is kept up to date as a best practice. 8. Conduct security reviews of telemetry and monitoring configurations to ensure minimal exposure of management interfaces.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.746Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c5d2fe3c064ed76ff40486

Added to database: 3/27/2026, 12:44:46 AM

Last enriched: 3/27/2026, 1:00:05 AM

Last updated: 3/27/2026, 2:03:40 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses