Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33728: CWE-502: Deserialization of Untrusted Data in DataDog dd-trace-java

0
Critical
VulnerabilityCVE-2026-33728cvecve-2026-33728cwe-502
Published: Fri Mar 27 2026 (03/27/2026, 00:25:56 UTC)
Source: CVE Database V5
Vendor/Project: DataDog
Product: dd-trace-java

Description

CVE-2026-33728 is a critical deserialization vulnerability in DataDog's dd-trace-java agent versions 0. 40. 0 through prior to 1. 60. 3. The vulnerability arises from the RMI instrumentation registering a custom endpoint that deserializes incoming data without applying serialization filters on JDK 16 and earlier. Exploitation requires that dd-trace-java is attached as a Java agent on a vulnerable JDK version, a network-reachable JMX/RMI port is configured, and a gadget-chain-compatible library is present on the classpath. Successful exploitation could lead to remote code execution. For JDK 17 and later, no action is required, but upgrading is recommended. For vulnerable versions, upgrading to dd-trace-java 1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 13:32:26 UTC

Technical Analysis

The dd-trace-java agent versions 0.40.0 up to but not including 1.60.3 contain a deserialization of untrusted data vulnerability (CWE-502) in their RMI instrumentation endpoint. This endpoint deserializes data without serialization filters on JDK 16 and earlier, allowing an attacker with network access to a configured JMX/RMI port to potentially execute remote code if a gadget-chain-compatible library is present. The vulnerability requires three conditions: the agent attached as a Java agent on JDK 16 or earlier, a network-reachable JMX/RMI port configured, and a suitable gadget chain on the classpath. JDK 17 and later are not affected. Mitigation includes upgrading to dd-trace-java 1.60.3 or later for JDK 8u121 through JDK 16, or disabling RMI integration via environment variable for older JDK versions lacking serialization filters.

Potential Impact

An attacker with network access to a configured JMX or RMI port on an instrumented JVM running dd-trace-java versions 0.40.0 to prior to 1.60.3 on JDK 16 or earlier can potentially achieve remote code execution. This could allow full compromise of the affected system. The vulnerability is critical with a CVSS 4.0 base score of 9.3, indicating high impact and ease of exploitation under the specified conditions.

Mitigation Recommendations

A fix is available by upgrading dd-trace-java to version 1.60.3 or later for JDK versions 8u121 through 16. For JDK 17 and later, no action is required, though upgrading is recommended. For JDK versions earlier than 8u121 where serialization filters are unavailable, apply the workaround by setting the environment variable DD_INTEGRATION_RMI_ENABLED=false to disable the vulnerable RMI integration. These steps effectively mitigate the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:34:57.560Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c5d2fe3c064ed76ff4048b

Added to database: 3/27/2026, 12:44:46 AM

Last enriched: 4/3/2026, 1:32:26 PM

Last updated: 5/11/2026, 7:19:29 AM

Views: 162

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses