The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-26464

CVE-2023-26464: Apache Log4j DOS Vulnerability

CVE-2023-26464 is a denial of service vulnerability in Apache Log4j 1.x that allows attackers to exhaust memory through specially-crafted nested objects. This article covers technical details, affected versions, and mitigation.

Published: February 11, 2026

CVE-2023-26464 Overview

CVE-2023-26464 is a high-severity Insecure Deserialization vulnerability affecting Apache Log4j 1.x when used with the Chainsaw or SocketAppender components on JRE versions less than 1.7. An attacker who can cause a logging entry involving a specially-crafted, deeply nested hashmap or hashtable to be processed could exhaust available memory in the virtual machine, resulting in a Denial of Service condition when the malicious object is deserialized.

This vulnerability is particularly significant because it affects a legacy, unsupported version of Log4j. The Apache Software Foundation has marked this vulnerability as "UNSUPPORTED WHEN ASSIGNED," meaning the affected Log4j 1.x branch is no longer receiving security updates.

Critical Impact

Memory exhaustion Denial of Service affecting applications using unsupported Log4j 1.x with Chainsaw or SocketAppender on older JRE versions (< 1.7). No patches available for Log4j 1.x - migration to Log4j 2.x is required.

Affected Products

  • Apache Log4j versions before 2.x
  • Applications using Chainsaw component with Log4j 1.x
  • Applications using SocketAppender component with Log4j 1.x on JRE < 1.7

Discovery Timeline

  • 2023-03-10 - CVE-2023-26464 published to NVD
  • 2025-02-13 - Last updated in NVD database

Technical Details for CVE-2023-26464

Vulnerability Analysis

This vulnerability (CWE-502: Deserialization of Untrusted Data) exploits the way Log4j 1.x processes serialized Java objects through the Chainsaw and SocketAppender components. When an attacker crafts a deeply nested hashmap or hashtable structure and causes it to be logged, the deserialization process attempts to reconstruct the entire object graph in memory.

The fundamental issue lies in how Java's native deserialization handles complex nested data structures. Each level of nesting in the malicious payload exponentially increases memory consumption during object reconstruction. On JRE versions prior to 1.7, certain memory management optimizations that could mitigate this attack are not present, making these environments particularly susceptible.

The Chainsaw component, a GUI-based log viewer, and SocketAppender, which sends logging events over network sockets, both accept serialized objects as part of their normal operation. This creates an attack surface where malicious serialized data can be injected into the logging pipeline.

Root Cause

The root cause is the unrestricted deserialization of Java objects in the Chainsaw and SocketAppender components without proper validation of object depth or complexity. Log4j 1.x does not implement safeguards to limit the resource consumption during deserialization of nested collection objects like HashMap or Hashtable, allowing attackers to craft payloads that consume exponential memory resources.

Attack Vector

The attack vector is network-based, requiring no privileges or user interaction. An attacker must be able to inject a specially-crafted serialized Java object into a logging entry that gets processed by either the Chainsaw or SocketAppender component. This could be achieved by:

  1. Sending malicious serialized data to an exposed SocketAppender endpoint
  2. Causing an application to log attacker-controlled data that includes the malicious nested structure
  3. Exploiting logging configurations that process untrusted input through these components

The deeply nested hashmap or hashtable structure triggers recursive memory allocation during deserialization, eventually exhausting the JVM heap space and causing an OutOfMemoryError, resulting in application crash or unresponsiveness.

Detection Methods for CVE-2023-26464

Indicators of Compromise

  • Sudden spikes in JVM heap memory usage correlated with logging activity
  • OutOfMemoryError exceptions in application logs referencing deserialization operations
  • Unusual network traffic patterns to SocketAppender listening ports
  • Application crashes or hangs during log processing operations

Detection Strategies

  • Monitor JVM memory metrics for anomalous consumption patterns during logging operations
  • Implement application-level logging to detect deserialization exceptions or errors
  • Scan application dependencies to identify Log4j 1.x usage with Chainsaw or SocketAppender configurations
  • Review logging configurations for exposed SocketAppender endpoints accepting remote connections

Monitoring Recommendations

  • Enable Java garbage collection logging to detect memory pressure events
  • Configure alerting on JVM heap utilization thresholds (e.g., > 80% sustained usage)
  • Monitor application availability and response times for degradation patterns
  • Audit network access to any SocketAppender listener ports

How to Mitigate CVE-2023-26464

Immediate Actions Required

  • Migrate from Log4j 1.x to Log4j 2.x as the primary remediation strategy
  • Disable or remove Chainsaw and SocketAppender components if migration is not immediately possible
  • Restrict network access to any SocketAppender listening endpoints
  • Upgrade JRE to version 1.7 or later to benefit from improved memory handling

Patch Information

No patch is available for Log4j 1.x as it has reached end-of-life and is no longer supported by the Apache Software Foundation. The official recommendation is to upgrade to Log4j 2.x, which addresses this vulnerability and includes numerous security improvements. For additional context, refer to the Apache Mailing List Discussion and the NetApp Security Advisory.

Workarounds

  • Remove Chainsaw and SocketAppender from Log4j configurations to eliminate the attack surface
  • Implement network segmentation to prevent untrusted access to logging endpoints
  • Configure JVM memory limits to contain the impact of memory exhaustion attacks
  • Deploy application-level input validation to filter potentially malicious serialized objects before logging
bash
# Configuration example - Disable SocketAppender in log4j.properties
# Remove or comment out SocketAppender configuration
# log4j.appender.socket=org.apache.log4j.net.SocketAppender
# log4j.appender.socket.RemoteHost=localhost
# log4j.appender.socket.Port=4445

# Alternative: Use FileAppender instead
log4j.appender.file=org.apache.log4j.RollingFileAppender
log4j.appender.file.File=/var/log/application.log
log4j.appender.file.MaxFileSize=10MB
log4j.appender.file.MaxBackupIndex=10
log4j.appender.file.layout=org.apache.log4j.PatternLayout
log4j.appender.file.layout.ConversionPattern=%d{yyyy-MM-dd HH:mm:ss} %-5p %c{1}:%L - %m%n

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechApache Log4j

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.11%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • Apache Mailing List Discussion

  • NetApp Security Advisory
  • Related CVEs
  • CVE-2021-45105: Apache Log4j DoS Vulnerability

  • CVE-2021-44228: Siemens 6bk1602-0aa12-0tp0 RCE Flaw

  • CVE-2025-68161: Apache Log4j Information Disclosure Bug

  • CVE-2021-45046: Apache Log4j RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English