The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-42585

CVE-2026-42585: Netty Request Smuggling Vulnerability

CVE-2026-42585 is a request smuggling flaw in Netty's Transfer-Encoding parser that allows attackers to bypass security controls. This article covers the technical details, affected versions, and mitigation strategies.

Published: May 14, 2026

CVE-2026-42585 Overview

CVE-2026-42585 is an HTTP Request Smuggling vulnerability in Netty, an asynchronous, event-driven network application framework widely used in Java-based servers, proxies, and microservices. The flaw stems from incorrect parsing of malformed Transfer-Encoding headers, allowing attackers to desynchronize front-end and back-end HTTP processing. The vulnerability affects Netty versions prior to 4.2.13.Final and 4.1.133.Final and is classified under CWE-444 (Inconsistent Interpretation of HTTP Requests).

Critical Impact

Attackers can smuggle HTTP requests through intermediaries, bypass security controls, poison caches, and hijack user sessions on applications that rely on Netty for HTTP request parsing.

Affected Products

  • Netty versions prior to 4.2.13.Final
  • Netty versions prior to 4.1.133.Final
  • Applications and frameworks that embed vulnerable Netty HTTP codecs

Discovery Timeline

  • 2026-05-13 - CVE-2026-42585 published to NVD
  • 2026-05-13 - Last updated in NVD database

Technical Details for CVE-2026-42585

Vulnerability Analysis

Netty's HTTP codec incorrectly parses malformed Transfer-Encoding headers in inbound HTTP requests. When a front-end proxy and the Netty-based back-end interpret the same request differently, an attacker can append a hidden second request to a benign one. The back-end treats the smuggled bytes as a new request, while the proxy treats them as part of the original message body.

Request smuggling enables session hijacking, cache poisoning, security control bypass, and unauthorized access to internal endpoints. Because Netty often runs in reverse proxies, API gateways, and microservice meshes, exploitation can affect entire service chains rather than a single endpoint.

The vulnerability requires no authentication or user interaction and is exploitable remotely over the network against any HTTP listener built on the vulnerable codec.

Root Cause

The root cause is lenient handling of malformed Transfer-Encoding header values. RFC 7230 requires strict rejection of ambiguous chunked encoding declarations, but the vulnerable Netty versions accept variants that differ from how upstream proxies interpret them. This interpretation gap is the foundation of all HTTP Request Smuggling attacks classified under [CWE-444].

Attack Vector

An attacker crafts a single HTTP request containing both Content-Length and a malformed Transfer-Encoding header, or a Transfer-Encoding header with obfuscated whitespace, casing, or duplicate values. The front-end accepts one interpretation while Netty applies another, causing the boundary between requests to shift. The smuggled portion is then processed as a fresh request, potentially executing in the security context of subsequent legitimate users.

Refer to the GitHub Security Advisory GHSA-38f8-5428-x5cv for technical specifics on the malformed header variants.

Detection Methods for CVE-2026-42585

Indicators of Compromise

  • HTTP requests containing both Content-Length and Transfer-Encoding headers in the same message
  • Transfer-Encoding headers with non-standard whitespace, tabs, or unusual casing such as Transfer-Encoding : chunked
  • Unexpected requests in back-end logs that lack a corresponding entry in front-end proxy logs
  • Anomalous response-to-request correlation, such as responses returned to the wrong client connection

Detection Strategies

  • Compare front-end proxy access logs against Netty back-end logs to identify request count or boundary mismatches
  • Inspect raw HTTP traffic for duplicate framing headers and malformed Transfer-Encoding values
  • Deploy web application firewall rules that reject ambiguous framing per RFC 7230 §3.3.3
  • Enumerate deployed Java applications and identify embedded Netty versions through dependency scans

Monitoring Recommendations

  • Alert on HTTP requests that include both Transfer-Encoding and Content-Length headers
  • Monitor for sudden spikes in 400-class responses from Netty-based services, which can indicate smuggling probes
  • Track outbound responses to internal administrative endpoints that should not be externally reachable

How to Mitigate CVE-2026-42585

Immediate Actions Required

  • Upgrade Netty to 4.2.13.Final or 4.1.133.Final across all services and transitive dependencies
  • Audit application dependency trees using mvn dependency:tree or gradle dependencies to locate shaded or relocated Netty copies
  • Restart all services after upgrading to ensure the patched codec is loaded into running JVMs

Patch Information

Netty maintainers released fixes in versions 4.2.13.Final and 4.1.133.Final. The patches enforce strict parsing of Transfer-Encoding headers and reject malformed values consistent with RFC 7230. Patch details are documented in the Netty GitHub Security Advisory GHSA-38f8-5428-x5cv.

Workarounds

  • Place a strict HTTP-compliant reverse proxy in front of Netty services that rejects requests with both Content-Length and Transfer-Encoding
  • Disable HTTP keep-alive on affected listeners to limit the scope of smuggling, accepting the performance trade-off
  • Configure web application firewalls to drop requests containing obfuscated Transfer-Encoding header variants
bash
# Example WAF rule pattern to block ambiguous framing
# ModSecurity rule blocking requests with both framing headers
SecRule REQUEST_HEADERS:Transfer-Encoding "@rx ." \
    "id:1042585,phase:1,deny,status:400,\
    chain,msg:'CVE-2026-42585 - Ambiguous HTTP framing'"
    SecRule REQUEST_HEADERS:Content-Length "@rx ."

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechNetty

  • SeverityMEDIUM

  • CVSS Score6.5

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-444
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-42581: Netty HTTP Request Smuggling Vulnerability

  • CVE-2026-42579: Netty DNS Codec Vulnerability

  • CVE-2026-42578: Netty HTTP Header Injection Vulnerability

  • CVE-2026-41417: Netty HTTP Request Smuggling Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English