The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-6378

CVE-2023-6378: Qos Logback DOS Vulnerability

CVE-2023-6378 is a serialization denial-of-service flaw in Qos Logback receiver component that allows attackers to send poisoned data. This post explains its technical details, affected versions, and mitigation.

Published: February 11, 2026

CVE-2023-6378 Overview

A serialization vulnerability exists in the logback receiver component of logback version 1.4.11 that allows an attacker to mount a Denial-of-Service (DoS) attack by sending poisoned data. Logback is a widely-used logging framework for Java applications, serving as a successor to the popular log4j project. This vulnerability specifically targets the receiver component, which is responsible for accepting log events from remote sources over the network.

Critical Impact

Attackers can remotely trigger a Denial-of-Service condition by sending specially crafted serialized data to the logback receiver, potentially disrupting critical application logging infrastructure and dependent services.

Affected Products

  • QOS Logback version 1.4.11
  • QOS Logback versions prior to 1.3.12 (1.3.x branch)
  • QOS Logback versions prior to 1.4.12 (1.4.x branch)

Discovery Timeline

  • 2023-11-29 - CVE CVE-2023-6378 published to NVD
  • 2024-11-29 - Last updated in NVD database

Technical Details for CVE-2023-6378

Vulnerability Analysis

This vulnerability is classified as CWE-502: Deserialization of Untrusted Data. The logback receiver component accepts serialized Java objects over the network without adequate validation, enabling attackers to submit malicious payloads that trigger resource exhaustion or application crashes during the deserialization process.

The attack can be conducted remotely over the network without requiring any prior authentication or user interaction. While the vulnerability does not compromise data confidentiality or integrity, it poses a significant availability risk to systems running vulnerable logback configurations with the receiver component enabled.

Root Cause

The root cause lies in the insecure deserialization practices within the logback receiver component. When the receiver processes incoming log events, it deserializes Java objects without properly validating or sanitizing the incoming data stream. This allows attackers to craft malicious serialized objects that, when processed, consume excessive resources or trigger exception conditions that result in service disruption.

The receiver component in logback is designed to accept log events from remote SocketAppender instances, making it inherently exposed to network-based attacks when enabled. The lack of input validation on the serialization stream creates an attack surface that can be exploited without authentication.

Attack Vector

The attack vector for this vulnerability is network-based. An attacker can exploit this vulnerability by:

  1. Identifying a target system running logback with the receiver component enabled
  2. Crafting a malicious serialized payload designed to trigger a DoS condition
  3. Sending the poisoned data to the logback receiver endpoint
  4. Causing the target application's logging infrastructure to become unavailable

The vulnerability does not require attacker authentication, specialized access, or user interaction, making it straightforward to exploit against exposed receiver endpoints.

Detection Methods for CVE-2023-6378

Indicators of Compromise

  • Unusual network traffic patterns to logback receiver ports (typically TCP connections)
  • Application crashes or hangs related to logback receiver threads
  • Increased memory consumption or CPU utilization in Java applications using logback
  • Exception logs indicating deserialization failures or ObjectInputStream errors

Detection Strategies

  • Monitor network connections to logback receiver endpoints for anomalous traffic volumes or connection patterns
  • Implement application performance monitoring to detect sudden resource exhaustion in logging components
  • Review application logs for serialization-related exceptions or stack traces involving ch.qos.logback.classic.net.server packages
  • Deploy network intrusion detection rules targeting malformed Java serialization streams

Monitoring Recommendations

  • Enable verbose logging for logback receiver components during investigation periods
  • Set up alerts for application restarts or crashes in services using logback receivers
  • Monitor JVM heap and thread metrics for applications with receiver functionality enabled
  • Implement network flow analysis to baseline normal receiver traffic and detect deviations

How to Mitigate CVE-2023-6378

Immediate Actions Required

  • Upgrade logback to version 1.3.12 or later for the 1.3.x branch
  • Upgrade logback to version 1.4.12 or later for the 1.4.x branch
  • If upgrading is not immediately possible, disable the logback receiver component until patches can be applied
  • Review network exposure of logback receiver endpoints and implement firewall rules to restrict access

Patch Information

QOS has released patched versions addressing this vulnerability. Users should upgrade to:

  • Logback 1.3.12 or later for applications on the 1.3.x branch
  • Logback 1.4.12 or later for applications on the 1.4.x branch

For detailed release information, refer to the Logback Release Notes 1.3.12. Additional vendor guidance is available in the NetApp Security Advisory NTAP-20241129-0012.

Workarounds

  • Disable the logback receiver component if it is not required for your application's functionality
  • Implement network segmentation to isolate logback receiver endpoints from untrusted networks
  • Use firewall rules to restrict access to logback receiver ports to known, trusted log sources only
  • Consider switching to alternative log aggregation mechanisms that do not rely on Java serialization
bash
# Configuration example - Disable receiver in logback.xml
# Remove or comment out the receiver configuration:
# <receiver class="ch.qos.logback.classic.net.server.ServerSocketReceiver">
#   <port>4560</port>
# </receiver>

# Alternatively, restrict network access via firewall
iptables -A INPUT -p tcp --dport 4560 -s trusted_source_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 4560 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeDOS

  • Vendor/TechQos Logback

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.61%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-502
  • Technical References
  • Logback Release Notes 1.3.12

  • NetApp Security Advisory NTAP-20241129-0012
  • Related CVEs
  • CVE-2023-6481: Qos Logback DoS Vulnerability

  • CVE-2021-42550: Qos Logback RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English