The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-14062

CVE-2020-14062: Jackson-databind RCE Vulnerability

CVE-2020-14062 is a remote code execution vulnerability in FasterXML Jackson-databind that exploits serialization gadgets and typing mishandling. This article covers the technical details, affected versions, and mitigation strategies.

Published: March 4, 2026

CVE-2020-14062 Overview

CVE-2020-14062 is an insecure deserialization vulnerability in FasterXML jackson-databind 2.x before version 2.9.10.5. The vulnerability stems from improper handling of the interaction between serialization gadgets and polymorphic typing, specifically related to the com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool class (also known as xalan2). This flaw allows attackers to craft malicious JSON payloads that, when deserialized by vulnerable applications, can lead to remote code execution.

Critical Impact

Attackers can exploit this deserialization vulnerability to achieve remote code execution on systems running vulnerable jackson-databind versions when polymorphic type handling is enabled and the xalan2 library is present in the classpath.

Affected Products

  • FasterXML jackson-databind versions prior to 2.9.10.5
  • NetApp Active IQ Unified Manager (Linux, Windows, VMware vSphere)
  • NetApp SteelStore Cloud Integrated Storage
  • Debian Linux 8.0
  • Oracle Agile PLM 9.3.6
  • Oracle Banking Digital Experience 18.1, 18.2, 18.3, 19.1, 19.2, 20.1
  • Oracle Communications Calendar Server 8.0.0.4.0
  • Oracle Communications Contacts Server 8.0.0.5.0
  • Oracle Communications Diameter Signaling Router
  • Oracle Communications Element Manager
  • Oracle Communications Evolved Communications Application Server 7.1
  • Oracle Communications Session Report Manager
  • Oracle Communications Session Route Manager

Discovery Timeline

  • June 14, 2020 - CVE-2020-14062 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2020-14062

Vulnerability Analysis

This vulnerability is classified as CWE-502 (Deserialization of Untrusted Data). The flaw exists in how jackson-databind processes polymorphic deserialization when default typing is enabled. The com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool class serves as a gadget that can be exploited during the deserialization process.

When an application using jackson-databind deserializes untrusted JSON input with polymorphic type handling enabled, an attacker can inject a specially crafted payload that references the vulnerable xalan2 class. This class interacts with JNDI (Java Naming and Directory Interface), which can be manipulated to load arbitrary objects from remote servers, ultimately leading to code execution.

The attack requires network access but does not require authentication or user interaction. The complexity is considered higher due to the need for specific conditions to be met, including the presence of the xalan2 library in the application's classpath and polymorphic typing being enabled.

Root Cause

The root cause lies in jackson-databind's polymorphic type handling feature, which allows JSON to specify the class type for deserialization. Without proper blocklisting of dangerous classes, attackers can specify gadget classes like JNDIConnectionPool that perform dangerous operations during instantiation or through setter methods. The JNDIConnectionPool class, when instantiated with attacker-controlled parameters, can be coerced into making JNDI lookups to malicious servers, enabling remote class loading and code execution.

Attack Vector

The attack is conducted over the network by sending a malicious JSON payload to an application endpoint that deserializes JSON using a vulnerable jackson-databind configuration. The attacker crafts JSON that specifies the com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool as the type to instantiate, along with parameters that cause the class to perform a JNDI lookup to an attacker-controlled server. This server responds with a malicious Java object that executes arbitrary code when loaded.

The exploitation mechanism involves:

  1. The attacker identifies an application using vulnerable jackson-databind with polymorphic typing enabled
  2. A malicious JSON payload is crafted containing the xalan2 gadget class reference
  3. The payload includes a JNDI URL pointing to an attacker-controlled LDAP or RMI server
  4. When deserialized, jackson-databind instantiates the gadget class and triggers the JNDI lookup
  5. The malicious server responds with a serialized Java object containing exploit code
  6. The vulnerable application loads and executes the malicious code

Detection Methods for CVE-2020-14062

Indicators of Compromise

  • Unexpected outbound JNDI/LDAP/RMI connections from Java applications to external servers
  • JSON payloads containing references to com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool in application logs
  • Anomalous class loading activity in Java applications processing JSON input
  • Network traffic to suspicious LDAP servers on non-standard ports

Detection Strategies

  • Monitor application logs for deserialization errors or unexpected class instantiation attempts involving xalan2 classes
  • Implement network monitoring to detect outbound JNDI lookups to untrusted destinations
  • Deploy application-level JSON input validation to reject payloads containing suspicious type hints
  • Utilize runtime application self-protection (RASP) tools to detect and block deserialization attacks

Monitoring Recommendations

  • Enable verbose logging for jackson-databind operations to capture deserialization attempts
  • Configure network egress filtering to restrict outbound LDAP/RMI connections from application servers
  • Implement alerting on any attempts to instantiate blocklisted gadget classes
  • Conduct regular dependency scanning to identify vulnerable jackson-databind versions in your environment

How to Mitigate CVE-2020-14062

Immediate Actions Required

  • Upgrade jackson-databind to version 2.9.10.5 or later immediately
  • If immediate patching is not possible, disable polymorphic type handling (default typing) in jackson-databind configuration
  • Audit applications for use of ObjectMapper.enableDefaultTyping() or @JsonTypeInfo annotations with untrusted input
  • Review and restrict the classpath to remove unnecessary gadget classes like xalan2 where possible

Patch Information

FasterXML has addressed this vulnerability in jackson-databind version 2.9.10.5 by adding com.sun.org.apache.xalan.internal.lib.sql.JNDIConnectionPool to the blocklist of classes that cannot be deserialized when polymorphic typing is enabled. Organizations should upgrade to this version or later. Additional security advisories have been published by NetApp and Oracle through multiple Critical Patch Updates. For detailed information, refer to the GitHub Issue #2704.

Workarounds

  • Disable default typing entirely using ObjectMapper.disableDefaultTyping() if not required by your application
  • Implement a custom type validator using ObjectMapper.setDefaultTyping() with an explicit whitelist of allowed classes
  • Use PolymorphicTypeValidator (available in jackson-databind 2.10+) to restrict which classes can be deserialized
  • Deploy network-level controls to block outbound JNDI connections from application servers
bash
# Example: Verify jackson-databind version in Maven projects
mvn dependency:tree -Dincludes=com.fasterxml.jackson.core:jackson-databind

# Update pom.xml to use patched version
# <dependency>
#     <groupId>com.fasterxml.jackson.core</groupId>
#     <artifactId>jackson-databind</artifactId>
#     <version>2.9.10.5</version>
# </dependency>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechJackson Databind

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability7.71%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • Debian LTS Advisory July 2020

  • Medium Analysis on Jackson CVEs

  • NetApp Advisory ntap-20200702-0003

  • Oracle CPU July 2021 Alert

  • Oracle CPU April 2021 Alert

  • Oracle CPU January 2021 Alert

  • Oracle CPU October 2020 Alert

  • Oracle CPU October 2021 Alert
  • Vendor Resources
  • GitHub Issue #2704
  • Related CVEs
  • CVE-2020-10650: Debian Linux RCE Vulnerability

  • CVE-2020-36188: Jackson-databind RCE Vulnerability

  • CVE-2020-24750: Jackson-databind RCE Vulnerability

  • CVE-2020-36518: Jackson-databind DoS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English