The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-35567

CVE-2021-35567: Oracle OpenJDK Auth Bypass Vulnerability

CVE-2021-35567 is an authentication bypass vulnerability in Oracle OpenJDK that enables unauthorized access to critical data via Kerberos. This article covers technical details, affected versions, impact, and mitigation.

Published: February 25, 2026

CVE-2021-35567 Overview

CVE-2021-35567 is a vulnerability in the Java SE and Oracle GraalVM Enterprise Edition products affecting the Libraries component. This flaw allows a low-privileged attacker with network access via the Kerberos protocol to compromise affected Java installations. The vulnerability is easily exploitable but requires human interaction from a person other than the attacker. Notably, while the vulnerability exists in Java SE and GraalVM Enterprise Edition, successful attacks may significantly impact additional products beyond the vulnerable component.

This vulnerability is particularly concerning for Java deployments running sandboxed Java Web Start applications or sandboxed Java applets that load and execute untrusted code from external sources such as the internet. Organizations relying on the Java sandbox for security isolation should prioritize remediation. The vulnerability can also be exploited through APIs in the specified Libraries component, including through web services that supply data to these APIs.

Critical Impact

Successful exploitation can result in unauthorized access to critical data or complete access to all Java SE and Oracle GraalVM Enterprise Edition accessible data, with attacks potentially impacting additional products beyond the vulnerable component.

Affected Products

  • Oracle Java SE 8u301, 11.0.12, and 17
  • Oracle GraalVM Enterprise Edition 20.3.3 and 21.2.0
  • Oracle JDK 1.8.0 Update 301, 11.0.12, and 17
  • Oracle JRE 1.8.0 Update 301, 11.0.12, and 17
  • NetApp Active IQ Unified Manager (VMware vSphere and Windows)
  • NetApp E-Series SANtricity OS Controller, Storage Manager, and Web Services
  • NetApp HCI Management Node, OnCommand Insight, OnCommand Workflow Automation
  • NetApp Santricity Unified Manager, SnapManager, and SolidFire
  • Debian Linux 9.0, 10.0, and 11.0
  • Fedora 33, 34, and 35

Discovery Timeline

  • October 20, 2021 - CVE-2021-35567 published to NVD
  • August 15, 2025 - Last updated in NVD database

Technical Details for CVE-2021-35567

Vulnerability Analysis

This vulnerability resides in the Libraries component of Oracle Java SE and GraalVM Enterprise Edition, specifically affecting Kerberos authentication handling. The flaw enables attackers to bypass security controls and gain unauthorized access to sensitive data within Java environments.

The vulnerability's scope is notable because attacks against the vulnerable component can significantly impact additional products. This "changed scope" characteristic means that an attacker exploiting this vulnerability in Java may be able to access resources and data in other systems that trust the compromised Java environment.

The attack requires a low-privileged attacker to have network access to the target system via the Kerberos protocol. While the exploitation complexity is low, it requires some form of user interaction (such as clicking a link or visiting a malicious page), which provides a limited defensive barrier against fully automated attacks.

Root Cause

The vulnerability stems from improper handling within the Java Libraries component when processing Kerberos authentication requests. The flaw allows authentication mechanisms to be manipulated in a way that exposes confidential information to unauthorized parties. The issue affects the security boundaries that the Java sandbox is designed to enforce, particularly for applets and Web Start applications that load untrusted code.

Attack Vector

The attack vector is network-based, specifically leveraging the Kerberos authentication protocol. An attacker can exploit this vulnerability through several methods:

  1. Sandboxed Applications: Crafting malicious Java Web Start applications or Java applets that, when executed by a victim, exploit the vulnerability to access sensitive data
  2. API Exploitation: Supplying malicious data to vulnerable APIs through web services or other network-accessible interfaces that interact with the affected Libraries component
  3. Client-Side Attacks: Tricking users into running untrusted Java code that leverages the flaw to bypass sandbox restrictions

The vulnerability specifically targets confidentiality, allowing attackers to read sensitive information rather than modify or destroy data.

Detection Methods for CVE-2021-35567

Indicators of Compromise

  • Unusual Kerberos authentication traffic patterns or failed authentication attempts from unexpected sources
  • Java processes accessing sensitive files or resources outside of expected sandbox boundaries
  • Anomalous network connections from Java applications to external or unexpected Kerberos Key Distribution Centers (KDCs)
  • Suspicious Java Web Start or applet executions from untrusted sources

Detection Strategies

  • Monitor for unexpected Kerberos ticket requests and authentications originating from Java processes
  • Implement network traffic analysis to detect anomalous communications over Kerberos ports (TCP/UDP 88)
  • Deploy application-level logging to track Java applet and Web Start application executions
  • Use endpoint detection solutions to identify Java processes exhibiting unusual data access patterns

Monitoring Recommendations

  • Enable verbose logging for Java Security Manager events to capture sandbox bypass attempts
  • Configure SIEM rules to alert on unusual patterns of Kerberos authentication involving Java applications
  • Implement file integrity monitoring for sensitive data accessible to Java applications
  • Monitor for unexpected outbound data transfers following Java application execution

How to Mitigate CVE-2021-35567

Immediate Actions Required

  • Update all Oracle Java SE installations to versions newer than 8u301, 11.0.12, and 17
  • Upgrade Oracle GraalVM Enterprise Edition to versions newer than 20.3.3 and 21.2.0
  • Disable Java browser plugins and Java Web Start if not required for business operations
  • Restrict network access to Kerberos services from untrusted Java applications
  • Apply vendor patches for affected third-party products including NetApp and Fedora/Debian distributions

Patch Information

Oracle has released patches for this vulnerability as part of the Oracle Critical Patch Update from October 2021. Organizations should apply the October 2021 CPU or later updates to all affected Java SE and GraalVM Enterprise Edition installations.

Additional vendor advisories and patches are available from:

  • NetApp Security Advisory
  • Debian Security Advisory DSA-5000
  • Debian Security Advisory DSA-5012
  • Gentoo GLSA 2022-09-05
  • Debian LTS Announcement

Workarounds

  • Disable Java Web Start and browser-based applet execution if not operationally required
  • Implement strict network segmentation to limit Kerberos protocol access from Java application servers
  • Configure Java Security Manager with restrictive policies to limit sandbox escape potential
  • Deploy application whitelisting to prevent execution of untrusted Java applications
  • Use SentinelOne Singularity Platform to monitor and protect Java application behavior for signs of exploitation
bash
# Example: Disable Java Plugin and Web Start
# On Windows, disable via Java Control Panel or registry
reg add "HKLM\SOFTWARE\JavaSoft\Java Plug-in" /v UseJava2IExplorer /t REG_DWORD /d 0 /f

# On Linux, remove Java browser plugin symlinks
sudo update-alternatives --remove-all javaws
sudo update-alternatives --remove-all javaplugin

# Verify Java version is patched
java -version
# Ensure version is newer than 8u301, 11.0.12, or 17

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechOracle Openjdk

  • SeverityMEDIUM

  • CVSS Score6.8

  • EPSS Probability0.17%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • NVD-CWE-noinfo
  • Technical References
  • Debian LTS Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Fedora Package Announcement

  • Gentoo GLSA 2022-09-05

  • NetApp Security Advisory

  • Debian Security Advisory DSA-5000

  • Debian Security Advisory DSA-5012
  • Vendor Resources
  • Oracle Critical Patch Update
  • Related CVEs
  • CVE-2020-14798: Oracle OpenJDK Auth Bypass Vulnerability

  • CVE-2020-14797: Oracle OpenJDK Auth Bypass Vulnerability

  • CVE-2020-14782: Oracle OpenJDK Auth Bypass Vulnerability

  • CVE-2020-14792: Oracle OpenJDK Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English