Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-21348

CVE-2021-21348: NetApp OnCommand Insight DoS Vulnerability

CVE-2021-21348 is a denial of service flaw in NetApp OnCommand Insight affecting XStream library that allows attackers to consume maximum CPU time. This article covers technical details, affected versions, and mitigations.

Published: February 25, 2026

CVE-2021-21348 Overview

CVE-2021-21348 is a denial of service vulnerability in XStream, a popular Java library used to serialize objects to XML and back again. In versions prior to 1.4.16, a remote attacker can craft malicious XML input that causes a thread to consume maximum CPU time indefinitely without returning, effectively creating a resource exhaustion condition.

The vulnerability exploits weaknesses in XStream's default security configuration. Applications that rely on XStream's built-in blacklist approach for security rather than implementing a proper whitelist are susceptible to this attack. The flaw enables unauthenticated attackers to degrade application performance or cause complete service unavailability through sustained CPU exhaustion.

Critical Impact

Remote attackers can exploit this vulnerability to cause complete denial of service by consuming maximum CPU resources on threads processing malicious XML input, potentially rendering affected applications and services unavailable.

Affected Products

  • XStream versions prior to 1.4.16
  • Apache ActiveMQ 5.16.0 and 5.16.1
  • Apache JMeter (versions using vulnerable XStream)
  • NetApp OnCommand Insight
  • Debian Linux 9.0, 10.0, and 11.0
  • Fedora 33, 34, and 35
  • Oracle Banking Enterprise Default Management 2.10.0 and 2.12.0
  • Oracle Banking Platform 2.4.0, 2.7.1, 2.9.0, and 2.12.0
  • Oracle Banking Virtual Account Management 14.2.0, 14.3.0, and 14.5.0
  • Oracle Business Activity Monitoring 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0
  • Oracle Communications Billing and Revenue Management Elastic Charging Engine 12.0.0.3.0
  • Oracle Communications Policy Management 12.5.0
  • Oracle Communications Unified Inventory Management 7.3.2 through 7.4.1
  • Oracle MySQL Server
  • Oracle Retail XStore Point of Service 16.0.6, 17.0.4, 18.0.3, and 19.0.2
  • Oracle WebCenter Portal 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0

Discovery Timeline

  • 2021-03-23 - CVE-2021-21348 published to NVD
  • 2025-05-23 - Last updated in NVD database

Technical Details for CVE-2021-21348

Vulnerability Analysis

This vulnerability falls under CWE-400 (Uncontrolled Resource Consumption). The flaw exists in how XStream processes certain XML constructs during deserialization. When XStream encounters specially crafted XML input, the parsing logic enters a state where a processing thread consumes maximum CPU cycles without completing its operation or returning control.

The attack can be executed remotely over the network without requiring authentication or user interaction. The vulnerability specifically impacts system availability while leaving data confidentiality and integrity unaffected. Applications that process untrusted XML input through XStream are particularly at risk.

The vulnerability's impact is limited to users who have not configured XStream's security framework with an explicit whitelist of allowed types. Organizations that followed the recommended security practice of implementing type whitelisting are not affected by this vulnerability.

Root Cause

The root cause stems from XStream's default security approach using a blacklist mechanism rather than a whitelist. The blacklist attempts to block known dangerous types during deserialization, but this approach is inherently incomplete. The vulnerability exploits types or constructs not included in the blacklist that can trigger infinite or extremely long-running CPU-bound operations.

When processing malicious input, the deserialization logic fails to properly bound the computational complexity of certain operations, allowing attackers to trigger algorithmic complexity attacks that exhaust CPU resources.

Attack Vector

The attack is network-based and requires no authentication or privileges. An attacker can exploit this vulnerability by sending specially crafted XML payloads to any endpoint that deserializes XML using a vulnerable version of XStream. The attack does not require any user interaction.

Attack scenarios include:

  • Targeting REST APIs that accept XML input
  • Exploiting SOAP web services using XStream for parsing
  • Attacking message queue consumers (such as Apache ActiveMQ)
  • Targeting any application that processes user-supplied XML through XStream

The malicious XML payload triggers CPU-intensive processing that blocks the handling thread indefinitely. In multi-threaded applications, repeated attacks can exhaust the thread pool, leading to complete service unavailability.

Detection Methods for CVE-2021-21348

Indicators of Compromise

  • Unusual CPU spikes on servers running Java applications that use XStream
  • Thread pool exhaustion in application servers with threads stuck in XML parsing operations
  • Application unresponsiveness following receipt of XML payloads
  • Log entries indicating XStream deserialization operations that never complete
  • Monitoring alerts for abnormally long-running request processing times

Detection Strategies

  • Monitor Java application thread dumps for threads blocked in XStream deserialization code paths
  • Implement application performance monitoring (APM) to detect CPU exhaustion patterns
  • Use Web Application Firewalls (WAF) to inspect and potentially block suspicious XML payloads
  • Deploy runtime application self-protection (RASP) solutions to detect deserialization attacks
  • Audit application dependencies to identify vulnerable XStream library versions

Monitoring Recommendations

  • Configure alerting for sustained high CPU utilization on application servers
  • Monitor thread pool metrics and alert on thread starvation conditions
  • Track request processing times and alert on requests exceeding normal thresholds
  • Implement logging for XStream deserialization events with timing information
  • Use security information and event management (SIEM) correlation rules to detect patterns of DoS attempts

How to Mitigate CVE-2021-21348

Immediate Actions Required

  • Upgrade XStream to version 1.4.16 or later immediately
  • Implement XStream's security framework with an explicit whitelist of required types
  • Review all applications using XStream and prioritize patching internet-facing services
  • Consider temporarily disabling XML-based endpoints until patches can be applied
  • Implement rate limiting on endpoints that process XML input

Patch Information

XStream version 1.4.16 contains the fix for this vulnerability. The patch addresses the CPU exhaustion issue by improving input validation and processing controls during deserialization. For detailed information about the fix, refer to the X-Stream Changes Summary.

Multiple vendors have released patches incorporating the fixed XStream library:

  • Oracle addressed this in their January 2022 Critical Patch Update
  • NetApp released Security Advisory NTAP-20210430-0002
  • Debian published DSA-5004
  • Fedora released package updates for affected distributions

For additional technical details about this vulnerability, see the GitHub Security Advisory GHSA-56p8-3fh9-4cvq and the X-Stream CVE-2021-21348 Details.

Workarounds

  • Configure XStream with a strict whitelist using the security framework, limiting deserialization to only the minimum required types
  • Implement request timeout controls at the application or load balancer level to terminate long-running requests
  • Deploy network-level controls to rate-limit or filter XML traffic to affected services
  • Consider using alternative serialization mechanisms if XStream cannot be immediately upgraded
  • Implement resource quotas for thread pools handling XML deserialization to prevent complete service exhaustion
bash
# Maven dependency update example - update pom.xml to use patched version
# Replace existing XStream dependency with:
# <dependency>
#   <groupId>com.thoughtworks.xstream</groupId>
#   <artifactId>xstream</artifactId>
#   <version>1.4.16</version>
# </dependency>

# Verify XStream version in your application
mvn dependency:tree | grep xstream

# For Gradle projects, update build.gradle:
# implementation 'com.thoughtworks.xstream:xstream:1.4.16'

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechNetapp Oncommand Insight

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.20%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-400
  • Technical References
  • X-Stream Changes Summary

  • GitHub Security Advisory GHSA-56p8-3fh9-4cvq

  • Apache ActiveMQ User Thread

  • Apache JMeter Dev Thread

  • Debian LTS Security Announcement

  • Fedora Package Announcement April 2021

  • Fedora Package Announcement (Unresolved)

  • Fedora Package Announcement (Deprecated)

  • NetApp Security Advisory NTAP-20210430-0002

  • Debian Security Advisory DSA-5004

  • Oracle Security Alert CPU July 2021

  • Oracle Security Alert CPU October 2021

  • X-Stream CVE-2021-21348 Details
  • Vendor Resources
  • Oracle Security Alert CPU January 2022

  • X-Stream Security Workarounds
  • Related CVEs
  • CVE-2021-21341: XStream Library DOS Vulnerability

  • CVE-2021-21350: NetApp OnCommand Insight RCE Vulnerability

  • CVE-2021-21349: NetApp OnCommand Insight SSRF Vulnerability

  • CVE-2021-21346: NetApp OnCommand Insight RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English