The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2022-35411

CVE-2022-35411: Rpc.py Remote Code Execution Vulnerability

CVE-2022-35411 is a remote code execution vulnerability in Rpc.py through version 0.6.0, allowing unauthenticated attackers to execute arbitrary code via unpickle operations. This article covers technical details, affected versions, security impact, and mitigation strategies.

Published: February 18, 2026

CVE-2022-35411 Overview

CVE-2022-35411 is a critical insecure deserialization vulnerability in rpc.py through version 0.6.0 that enables unauthenticated Remote Code Execution (RCE). The vulnerability occurs because the library performs an unsafe unpickle operation when an attacker sends a request with the serializer: pickle HTTP header. Although JSON is the default data serialization format, any unauthenticated client can force the server to process data using Python's dangerous pickle deserialization, leading to arbitrary code execution on the target system.

Critical Impact

Unauthenticated attackers can achieve full system compromise by sending malicious serialized Python objects via HTTP requests, requiring no user interaction or privileges.

Affected Products

  • rpc.py versions through 0.6.0
  • Applications using rpc.py with default configurations
  • Any service exposing rpc.py endpoints to untrusted networks

Discovery Timeline

  • 2022-07-08 - CVE-2022-35411 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2022-35411

Vulnerability Analysis

This vulnerability exploits Python's inherently dangerous pickle deserialization mechanism. Python's pickle module can serialize and deserialize arbitrary Python objects, including those containing executable code. When deserialization (unpickling) occurs on untrusted data, an attacker can craft a malicious payload that executes arbitrary code during the deserialization process.

In rpc.py, the PickleSerializer class was registered by default in both SERIALIZER_NAMES and SERIALIZER_TYPES dictionaries within rpcpy/serializers.py. This allowed any client to override the default JSON serializer by simply including the appropriate HTTP header in their request, forcing the server to deserialize incoming data using pickle instead of the safer JSON format.

The vulnerability is particularly severe because it requires no authentication, can be exploited remotely over the network, and provides full code execution capabilities on the target system.

Root Cause

The root cause is the unconditional registration of the PickleSerializer in the default serializer mappings. The SERIALIZER_NAMES and SERIALIZER_TYPES dictionaries included pickle as an available serialization option without any access controls or warnings. This design flaw allowed unauthenticated remote users to select the dangerous pickle serializer through HTTP header manipulation, bypassing the intended JSON-only serialization.

Attack Vector

The attack vector involves sending a crafted HTTP request to an rpc.py endpoint with the serializer: pickle header (or equivalent Content-Type header). The request body contains a malicious pickled Python object that, when deserialized by the server, executes arbitrary code. The attacker crafts a payload using Python's pickle module with a custom __reduce__ method that returns a callable (such as os.system) along with attacker-controlled arguments.

python
         return cbor.loads(data)
 
 
+# Since the release of pickle to the external network may lead to
+# arbitrary code execution vulnerabilities, this serialization
+# method is not enabled by default. It is recommended to turn it on
+# when there is physical isolation from the outside.
+
 SERIALIZER_NAMES = {
     JSONSerializer.name: JSONSerializer(),
-    PickleSerializer.name: PickleSerializer(),
+    # PickleSerializer.name: PickleSerializer(),
     MsgpackSerializer.name: MsgpackSerializer(),
     CBORSerializer.name: CBORSerializer(),
 }
 
 SERIALIZER_TYPES = {
     JSONSerializer.content_type: JSONSerializer(),
-    PickleSerializer.content_type: PickleSerializer(),
+    # PickleSerializer.content_type: PickleSerializer(),
     MsgpackSerializer.content_type: MsgpackSerializer(),
     CBORSerializer.content_type: CBORSerializer(),
 }

Source: GitHub Commit for rpc.py - Security patch that disables PickleSerializer by default

Detection Methods for CVE-2022-35411

Indicators of Compromise

  • HTTP requests to rpc.py endpoints containing serializer: pickle header
  • Requests with Content-Type: application/x-pickle or similar pickle-related content types
  • Unusual process spawning from Python processes serving rpc.py applications
  • Unexpected outbound network connections from application servers

Detection Strategies

  • Implement WAF rules to block HTTP requests containing pickle-related serializer headers
  • Monitor application logs for requests attempting to use non-JSON serialization formats
  • Deploy network intrusion detection signatures for pickle deserialization attack patterns
  • Use runtime application self-protection (RASP) to detect and block unsafe deserialization attempts

Monitoring Recommendations

  • Alert on any HTTP traffic with serializer: pickle header values targeting rpc.py services
  • Monitor for unusual process execution chains originating from Python web application processes
  • Implement file integrity monitoring on systems running rpc.py applications
  • Track and alert on any modifications to serializer configuration in deployed applications

How to Mitigate CVE-2022-35411

Immediate Actions Required

  • Upgrade rpc.py to a patched version that disables PickleSerializer by default
  • Audit all deployments using rpc.py to identify exposed instances
  • Implement network segmentation to restrict access to rpc.py services from untrusted networks
  • Deploy WAF rules to block requests with pickle serialization headers as an interim measure

Patch Information

The vulnerability has been addressed in commit 491e7a841ed9a754796d6ab047a9fb16e23bf8bd. The fix comments out the PickleSerializer registration in both SERIALIZER_NAMES and SERIALIZER_TYPES dictionaries within rpcpy/serializers.py. The patch also includes a warning comment explaining that pickle serialization should only be enabled in physically isolated network environments due to the arbitrary code execution risk. Apply the patch by updating to the latest version of rpc.py from the official repository. For more details, see the GitHub Commit for rpc.py.

Workarounds

  • Manually edit rpcpy/serializers.py to comment out or remove PickleSerializer from SERIALIZER_NAMES and SERIALIZER_TYPES
  • Deploy a reverse proxy that strips or rejects requests with pickle-related serializer headers
  • Restrict network access to rpc.py endpoints to trusted internal networks only
  • Implement application-level validation to reject non-JSON serialization requests before they reach rpc.py
bash
# Configuration example: Block pickle serializer at nginx reverse proxy level
# Add to nginx server or location block
if ($http_serializer ~* "pickle") {
    return 403;
}

# Or block by Content-Type header
if ($content_type ~* "pickle") {
    return 403;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechRpc.py

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability71.33%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-522
  • Technical References
  • Packet Storm Exploit Report

  • GitHub rpc.py Exploit Repository

  • Medium Blog on rpc.py 0-Day
  • Vendor Resources
  • GitHub Commit for rpc.py
  • Latest CVEs
  • CVE-2026-35467: Browser API Key Information Disclosure

  • CVE-2026-35466: cveInterface.js XSS Vulnerability

  • CVE-2026-30252: ZenShare Suite XSS Vulnerability

  • CVE-2026-30251: ZenShare Suite v17.0 XSS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English