CVE-2026-33728: CWE-502: Deserialization of Untrusted Data in DataDog dd-trace-java
CVE-2026-33728 is a critical deserialization vulnerability in DataDog's dd-trace-java agent versions 0. 40. 0 through prior to 1. 60. 3. It affects Java applications running on JDK 16 and earlier when dd-trace-java is attached as a Java agent and a network-accessible JMX/RMI port is configured. The vulnerability arises from unsafe deserialization of untrusted data via a custom RMI endpoint without serialization filters, enabling remote code execution if a suitable gadget chain exists on the classpath. Exploitation requires no authentication or user interaction but depends on specific environment conditions. JDK 17 and later are not vulnerable due to improved serialization filtering. Mitigation involves upgrading dd-trace-java to version 1.
AI Analysis
Technical Summary
CVE-2026-33728 is a critical security vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in DataDog's dd-trace-java agent, a Java APM client widely used for application performance monitoring. The flaw exists in versions 0.40.0 up to but not including 1.60.3. The vulnerability stems from the RMI instrumentation component registering a custom RMI endpoint that deserializes incoming data without applying Java serialization filters, which are security mechanisms designed to restrict classes that can be deserialized. This unsafe deserialization occurs on Java Virtual Machines running JDK 16 or earlier. An attacker with network access to a configured JMX or RMI port can send malicious serialized objects that, when deserialized, can trigger arbitrary code execution if a compatible gadget chain is present on the classpath. Exploitation requires three conditions: (1) dd-trace-java must be attached as a Java agent, (2) a JMX/RMI port must be explicitly configured and network-reachable, and (3) a gadget-chain-compatible library must be available in the JVM's classpath. The vulnerability does not require authentication or user interaction, making it highly exploitable in exposed environments. For JDK versions 17 and above, the issue is mitigated by built-in serialization filters, so no action is required, though upgrading dd-trace-java is recommended. For JDK versions between 8u121 and 16, upgrading dd-trace-java to 1.60.3 or later is necessary. For older JDK versions lacking serialization filters, a workaround involves disabling the RMI integration by setting the environment variable DD_INTEGRATION_RMI_ENABLED=false. This vulnerability has a CVSS 4.0 base score of 9.3, reflecting its critical severity and potential for remote code execution without privileges or user interaction.
Potential Impact
The impact of CVE-2026-33728 is severe, as it allows unauthenticated remote attackers to execute arbitrary code on vulnerable Java applications instrumented with dd-trace-java. This can lead to full system compromise, data theft, service disruption, and lateral movement within affected networks. Organizations exposing JMX/RMI ports over the network, especially in cloud or containerized environments where dd-trace-java is commonly deployed for monitoring, are at significant risk. The vulnerability undermines confidentiality, integrity, and availability of affected systems. Given the ease of exploitation and lack of required privileges, attackers can leverage this flaw to deploy malware, ransomware, or conduct espionage. The widespread use of DataDog's APM agent in enterprise Java applications globally increases the attack surface. Additionally, environments running older JDK versions without serialization filters are particularly vulnerable, making legacy systems prime targets. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the criticality of timely remediation.
Mitigation Recommendations
To mitigate CVE-2026-33728, organizations should: 1) Immediately upgrade dd-trace-java to version 1.60.3 or later, which includes fixes that enforce serialization filtering on deserialization endpoints. 2) For environments running JDK versions 8u121 through 16, prioritize upgrading the Java runtime to JDK 17 or later, which inherently mitigates this vulnerability through improved serialization filters. 3) For legacy JDK versions prior to 8u121 where upgrading is not feasible, disable the vulnerable RMI integration by setting the environment variable DD_INTEGRATION_RMI_ENABLED=false to prevent the custom RMI endpoint from deserializing untrusted data. 4) Restrict network access to JMX/RMI ports by implementing strict firewall rules, network segmentation, and VPN-only access to minimize exposure to untrusted networks. 5) Audit classpaths to remove or limit gadget-chain-compatible libraries that could be leveraged for exploitation. 6) Monitor network traffic and logs for unusual activity on JMX/RMI ports and anomalous deserialization attempts. 7) Incorporate runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block exploitation attempts. 8) Educate development and operations teams about the risks of unsafe deserialization and secure configuration of monitoring agents.
Affected Countries
United States, Germany, United Kingdom, France, Japan, India, Canada, Australia, Netherlands, Singapore
CVE-2026-33728: CWE-502: Deserialization of Untrusted Data in DataDog dd-trace-java
Description
CVE-2026-33728 is a critical deserialization vulnerability in DataDog's dd-trace-java agent versions 0. 40. 0 through prior to 1. 60. 3. It affects Java applications running on JDK 16 and earlier when dd-trace-java is attached as a Java agent and a network-accessible JMX/RMI port is configured. The vulnerability arises from unsafe deserialization of untrusted data via a custom RMI endpoint without serialization filters, enabling remote code execution if a suitable gadget chain exists on the classpath. Exploitation requires no authentication or user interaction but depends on specific environment conditions. JDK 17 and later are not vulnerable due to improved serialization filtering. Mitigation involves upgrading dd-trace-java to version 1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-33728 is a critical security vulnerability classified under CWE-502 (Deserialization of Untrusted Data) found in DataDog's dd-trace-java agent, a Java APM client widely used for application performance monitoring. The flaw exists in versions 0.40.0 up to but not including 1.60.3. The vulnerability stems from the RMI instrumentation component registering a custom RMI endpoint that deserializes incoming data without applying Java serialization filters, which are security mechanisms designed to restrict classes that can be deserialized. This unsafe deserialization occurs on Java Virtual Machines running JDK 16 or earlier. An attacker with network access to a configured JMX or RMI port can send malicious serialized objects that, when deserialized, can trigger arbitrary code execution if a compatible gadget chain is present on the classpath. Exploitation requires three conditions: (1) dd-trace-java must be attached as a Java agent, (2) a JMX/RMI port must be explicitly configured and network-reachable, and (3) a gadget-chain-compatible library must be available in the JVM's classpath. The vulnerability does not require authentication or user interaction, making it highly exploitable in exposed environments. For JDK versions 17 and above, the issue is mitigated by built-in serialization filters, so no action is required, though upgrading dd-trace-java is recommended. For JDK versions between 8u121 and 16, upgrading dd-trace-java to 1.60.3 or later is necessary. For older JDK versions lacking serialization filters, a workaround involves disabling the RMI integration by setting the environment variable DD_INTEGRATION_RMI_ENABLED=false. This vulnerability has a CVSS 4.0 base score of 9.3, reflecting its critical severity and potential for remote code execution without privileges or user interaction.
Potential Impact
The impact of CVE-2026-33728 is severe, as it allows unauthenticated remote attackers to execute arbitrary code on vulnerable Java applications instrumented with dd-trace-java. This can lead to full system compromise, data theft, service disruption, and lateral movement within affected networks. Organizations exposing JMX/RMI ports over the network, especially in cloud or containerized environments where dd-trace-java is commonly deployed for monitoring, are at significant risk. The vulnerability undermines confidentiality, integrity, and availability of affected systems. Given the ease of exploitation and lack of required privileges, attackers can leverage this flaw to deploy malware, ransomware, or conduct espionage. The widespread use of DataDog's APM agent in enterprise Java applications globally increases the attack surface. Additionally, environments running older JDK versions without serialization filters are particularly vulnerable, making legacy systems prime targets. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the criticality of timely remediation.
Mitigation Recommendations
To mitigate CVE-2026-33728, organizations should: 1) Immediately upgrade dd-trace-java to version 1.60.3 or later, which includes fixes that enforce serialization filtering on deserialization endpoints. 2) For environments running JDK versions 8u121 through 16, prioritize upgrading the Java runtime to JDK 17 or later, which inherently mitigates this vulnerability through improved serialization filters. 3) For legacy JDK versions prior to 8u121 where upgrading is not feasible, disable the vulnerable RMI integration by setting the environment variable DD_INTEGRATION_RMI_ENABLED=false to prevent the custom RMI endpoint from deserializing untrusted data. 4) Restrict network access to JMX/RMI ports by implementing strict firewall rules, network segmentation, and VPN-only access to minimize exposure to untrusted networks. 5) Audit classpaths to remove or limit gadget-chain-compatible libraries that could be leveraged for exploitation. 6) Monitor network traffic and logs for unusual activity on JMX/RMI ports and anomalous deserialization attempts. 7) Incorporate runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block exploitation attempts. 8) Educate development and operations teams about the risks of unsafe deserialization and secure configuration of monitoring agents.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T17:34:57.560Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c5d2fe3c064ed76ff4048b
Added to database: 3/27/2026, 12:44:46 AM
Last enriched: 3/27/2026, 12:59:53 AM
Last updated: 3/27/2026, 1:49:11 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.