INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 1h Global vulnerability Information Technology / Cybersecurity CRITICAL 3h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 7h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 8h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 1h Global vulnerability Information Technology / Cybersecurity CRITICAL 3h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 7h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 8h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 1h Global vulnerability Information Technology / Cybersecurity CRITICAL 3h Global malware Energy and Utilities CRITICAL 4h Global ransomware Multiple sectors CRITICAL 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 7h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 8h
Vulnerabilities

CVE-2017-12149

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Red Hat JBoss Application Server Remote Code Execution Vulnerability — The JBoss Application Server, shipped with Red Hat Enterprise Application Platform 5.2, allows an attacker to execute arbitrary c
Published: Dec 10, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Red Hat JBoss Application Server Remote Code Execution Vulnerability — The JBoss Application Server, shipped with Red Hat Enterprise Application Platform 5.2, allows an attacker to execute arbitrary code via crafted serialized data.

🤖 AI Executive Summary

CVE-2017-12149 is a critical remote code execution vulnerability in Red Hat JBoss Application Server (EAP 5.2) that allows attackers to execute arbitrary code through crafted serialized Java objects. This vulnerability has a CVSS score of 9.0 and known public exploits are actively available, making it extremely dangerous. The flaw exists in the HTTP Invoker component (specifically the ReadOnlyAccessFilter in the invoker/readonly endpoint) which does not properly restrict deserialization of untrusted data. Organizations still running JBoss EAP 5.x are at immediate risk of full system compromise.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 7, 2026 18:02
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi organizations, particularly in the government sector (ministries and agencies using legacy JBoss-based portals), banking/SAMA-regulated institutions running older Java enterprise applications, telecom operators (STC, Mobily, Zain) with legacy middleware, and energy sector organizations including ARAMCO and its contractors that may use JBoss EAP for internal enterprise applications. Saudi government e-services platforms built on older Java EE stacks are especially vulnerable. Given that JBoss EAP 5.2 is end-of-life, many Saudi organizations may still be running unpatched instances in production environments, particularly in legacy systems that have not been modernized.
🏢 Affected Saudi Sectors
Government Banking Telecom Energy Healthcare Education Retail
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Scan all environments for JBoss EAP 5.x instances, particularly checking for exposed /invoker/readonly and /invoker/JMXInvokerServlet endpoints
2. Block external access to JBoss invoker endpoints immediately via WAF/firewall rules
3. Disable or remove the HTTP Invoker service if not required by deleting or restricting access to the invoker web application

PATCHING GUIDANCE:
4. Apply Red Hat security patch RHSA-2017:3244 or upgrade to JBoss EAP 6.x/7.x which are not affected
5. If running EAP 5.2, note it is end-of-life — plan migration to a supported version immediately

COMPENSATING CONTROLS:
6. Implement network segmentation to isolate JBoss servers from internet-facing networks
7. Deploy Java deserialization attack detection signatures on IDS/IPS
8. Monitor for unusual outbound connections from JBoss application servers

DETECTION RULES:
9. Alert on HTTP POST requests to /invoker/readonly or /invoker/JMXInvokerServlet
10. Monitor for Java deserialization payloads (look for 'aced0005' hex pattern in HTTP request bodies)
11. Check for indicators of compromise: unexpected processes spawned by JBoss, web shells, reverse shell connections
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. فحص جميع البيئات بحثاً عن مثيلات JBoss EAP 5.x، خاصة التحقق من نقاط النهاية المكشوفة /invoker/readonly و /invoker/JMXInvokerServlet
2. حظر الوصول الخارجي إلى نقاط نهاية JBoss invoker فوراً عبر قواعد جدار الحماية/WAF
3. تعطيل أو إزالة خدمة HTTP Invoker إذا لم تكن مطلوبة

إرشادات التصحيح:
4. تطبيق تصحيح Red Hat الأمني RHSA-2017:3244 أو الترقية إلى JBoss EAP 6.x/7.x
5. إذا كنت تشغل EAP 5.2، فهو منتهي الدعم — خطط للترحيل إلى إصدار مدعوم فوراً

الضوابط التعويضية:
6. تنفيذ تجزئة الشبكة لعزل خوادم JBoss عن الشبكات المواجهة للإنترنت
7. نشر توقيعات كشف هجمات إلغاء تسلسل Java على أنظمة كشف/منع التسلل
8. مراقبة الاتصالات الصادرة غير العادية من خوادم تطبيقات JBoss

قواعد الكشف:
9. التنبيه على طلبات HTTP POST إلى /invoker/readonly أو /invoker/JMXInvokerServlet
10. مراقبة حمولات إلغاء تسلسل Java (البحث عن نمط 'aced0005' في أجسام طلبات HTTP)
11. التحقق من مؤشرات الاختراق: عمليات غير متوقعة تنشأ من JBoss، أصداف ويب، اتصالات أصداف عكسية
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
2-3-1 (Patch Management) 2-3-4 (Vulnerability Management) 2-5-1 (Network Security) 2-2-1 (Asset Management) 2-6-1 (Application Security)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.5 (Vulnerability Management) 3.3.7 (Network Security Management) 3.4.1 (Application Security) 3.3.11 (Security Event Logging and Monitoring)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.9 (Configuration management) A.8.20 (Networks security) A.8.23 (Web filtering) A.8.28 (Secure coding)
🟣 PCI DSS v4.0
6.3.3 (Patch critical vulnerabilities within one month) 6.2 (Develop software securely) 11.3 (Penetration testing) 1.3 (Network access controls)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Red Hat:JBoss Application Server
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.29%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-06-10
Published 2021-12-10
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.