CVE-2026-33728: CWE-502: Deserialization of Untrusted Data in DataDog dd-trace-java
CVE-2026-33728 is a critical deserialization vulnerability in DataDog's dd-trace-java agent versions 0. 40. 0 through prior to 1. 60. 3. The vulnerability arises from the RMI instrumentation registering a custom endpoint that deserializes incoming data without applying serialization filters on JDK 16 and earlier. Exploitation requires that dd-trace-java is attached as a Java agent on a vulnerable JDK version, a network-reachable JMX/RMI port is configured, and a gadget-chain-compatible library is present on the classpath. Successful exploitation could lead to remote code execution. For JDK 17 and later, no action is required, but upgrading is recommended. For vulnerable versions, upgrading to dd-trace-java 1.
AI Analysis
Technical Summary
The dd-trace-java agent versions 0.40.0 up to but not including 1.60.3 contain a deserialization of untrusted data vulnerability (CWE-502) in their RMI instrumentation endpoint. This endpoint deserializes data without serialization filters on JDK 16 and earlier, allowing an attacker with network access to a configured JMX/RMI port to potentially execute remote code if a gadget-chain-compatible library is present. The vulnerability requires three conditions: the agent attached as a Java agent on JDK 16 or earlier, a network-reachable JMX/RMI port configured, and a suitable gadget chain on the classpath. JDK 17 and later are not affected. Mitigation includes upgrading to dd-trace-java 1.60.3 or later for JDK 8u121 through JDK 16, or disabling RMI integration via environment variable for older JDK versions lacking serialization filters.
Potential Impact
An attacker with network access to a configured JMX or RMI port on an instrumented JVM running dd-trace-java versions 0.40.0 to prior to 1.60.3 on JDK 16 or earlier can potentially achieve remote code execution. This could allow full compromise of the affected system. The vulnerability is critical with a CVSS 4.0 base score of 9.3, indicating high impact and ease of exploitation under the specified conditions.
Mitigation Recommendations
A fix is available by upgrading dd-trace-java to version 1.60.3 or later for JDK versions 8u121 through 16. For JDK 17 and later, no action is required, though upgrading is recommended. For JDK versions earlier than 8u121 where serialization filters are unavailable, apply the workaround by setting the environment variable DD_INTEGRATION_RMI_ENABLED=false to disable the vulnerable RMI integration. These steps effectively mitigate the vulnerability.
CVE-2026-33728: CWE-502: Deserialization of Untrusted Data in DataDog dd-trace-java
Description
CVE-2026-33728 is a critical deserialization vulnerability in DataDog's dd-trace-java agent versions 0. 40. 0 through prior to 1. 60. 3. The vulnerability arises from the RMI instrumentation registering a custom endpoint that deserializes incoming data without applying serialization filters on JDK 16 and earlier. Exploitation requires that dd-trace-java is attached as a Java agent on a vulnerable JDK version, a network-reachable JMX/RMI port is configured, and a gadget-chain-compatible library is present on the classpath. Successful exploitation could lead to remote code execution. For JDK 17 and later, no action is required, but upgrading is recommended. For vulnerable versions, upgrading to dd-trace-java 1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The dd-trace-java agent versions 0.40.0 up to but not including 1.60.3 contain a deserialization of untrusted data vulnerability (CWE-502) in their RMI instrumentation endpoint. This endpoint deserializes data without serialization filters on JDK 16 and earlier, allowing an attacker with network access to a configured JMX/RMI port to potentially execute remote code if a gadget-chain-compatible library is present. The vulnerability requires three conditions: the agent attached as a Java agent on JDK 16 or earlier, a network-reachable JMX/RMI port configured, and a suitable gadget chain on the classpath. JDK 17 and later are not affected. Mitigation includes upgrading to dd-trace-java 1.60.3 or later for JDK 8u121 through JDK 16, or disabling RMI integration via environment variable for older JDK versions lacking serialization filters.
Potential Impact
An attacker with network access to a configured JMX or RMI port on an instrumented JVM running dd-trace-java versions 0.40.0 to prior to 1.60.3 on JDK 16 or earlier can potentially achieve remote code execution. This could allow full compromise of the affected system. The vulnerability is critical with a CVSS 4.0 base score of 9.3, indicating high impact and ease of exploitation under the specified conditions.
Mitigation Recommendations
A fix is available by upgrading dd-trace-java to version 1.60.3 or later for JDK versions 8u121 through 16. For JDK 17 and later, no action is required, though upgrading is recommended. For JDK versions earlier than 8u121 where serialization filters are unavailable, apply the workaround by setting the environment variable DD_INTEGRATION_RMI_ENABLED=false to disable the vulnerable RMI integration. These steps effectively mitigate the vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T17:34:57.560Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c5d2fe3c064ed76ff4048b
Added to database: 3/27/2026, 12:44:46 AM
Last enriched: 4/3/2026, 1:32:26 PM
Last updated: 5/11/2026, 7:19:29 AM
Views: 162
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.