INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 5h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 5h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h Global data_breach Government CRITICAL 1h Global ransomware Financial Services / Cybersecurity CRITICAL 2h Global vulnerability Information Technology / Cybersecurity CRITICAL 4h Global malware Energy and Utilities CRITICAL 5h Global ransomware Multiple sectors CRITICAL 5h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 7h Global supply_chain Information Technology and Critical Infrastructure CRITICAL 8h Global phishing Multiple sectors HIGH 8h Global insider Cybersecurity Services CRITICAL 8h Global ransomware Multiple sectors (U.S. companies) CRITICAL 9h
Vulnerabilities

CVE-2017-1000486

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Primetek Primefaces Remote Code Execution Vulnerability — Primetek Primefaces is vulnerable to a weak encryption flaw resulting in remote code execution
Published: Jan 10, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Primetek Primefaces Remote Code Execution Vulnerability — Primetek Primefaces is vulnerable to a weak encryption flaw resulting in remote code execution

🤖 AI Executive Summary

CVE-2017-1000486 is a critical remote code execution vulnerability in PrimeTek PrimeFaces, a widely-used JavaServer Faces (JSF) UI component library. The vulnerability stems from a weak encryption mechanism in the Expression Language (EL) evaluation feature, allowing attackers to craft malicious requests that execute arbitrary code on the server. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses an immediate threat to any organization running applications built with vulnerable PrimeFaces versions. Active exploitation has been observed in the wild, making immediate patching essential.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 7, 2026 13:25
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability significantly impacts Saudi organizations that use Java-based web applications built with PrimeFaces, which is common in enterprise environments. Government portals (NCA-regulated entities), banking and financial services (SAMA-regulated), healthcare systems, and energy sector applications (including ARAMCO and its contractors) that leverage JSF/PrimeFaces are at high risk. Many Saudi e-government services and internal enterprise applications use Java EE stacks with PrimeFaces components. Successful exploitation could lead to full server compromise, data exfiltration of sensitive citizen data, and lateral movement within critical infrastructure networks. Telecom operators like STC and Mobily running Java-based customer portals may also be affected.
🏢 Affected Saudi Sectors
Government Banking Healthcare Energy Telecommunications Education Retail
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all applications using PrimeFaces library by scanning for primefaces*.jar files across all servers
2. Upgrade PrimeFaces to version 6.2 or later immediately, which fixes the weak encryption vulnerability
3. If immediate patching is not possible, configure a strong custom encryption key by setting the 'primefaces.SECRET' context parameter in web.xml with a strong, random 16-byte key
4. Block or filter requests containing suspicious 'pfdrid' parameters at the WAF level

Detection Rules:
5. Monitor web server logs for unusual POST requests to javax.faces.resource endpoints with encoded payloads
6. Deploy IDS/IPS signatures for PrimeFaces EL injection patterns (Snort/Suricata rules available)
7. Implement application-level logging to detect EL expression evaluation attempts

Compensating Controls:
8. Restrict network access to affected applications using network segmentation
9. Implement WAF rules to inspect and block serialized Java objects in HTTP requests
10. Enable runtime application self-protection (RASP) if available
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع التطبيقات التي تستخدم مكتبة PrimeFaces عن طريق البحث عن ملفات primefaces*.jar عبر جميع الخوادم
2. ترقية PrimeFaces إلى الإصدار 6.2 أو أحدث فوراً، والذي يصلح ثغرة التشفير الضعيف
3. إذا لم يكن التصحيح الفوري ممكناً، قم بتكوين مفتاح تشفير مخصص قوي عن طريق تعيين معلمة 'primefaces.SECRET' في ملف web.xml بمفتاح عشوائي قوي بطول 16 بايت
4. حظر أو تصفية الطلبات التي تحتوي على معلمات 'pfdrid' مشبوهة على مستوى جدار حماية تطبيقات الويب

قواعد الكشف:
5. مراقبة سجلات خادم الويب للطلبات POST غير العادية إلى نقاط نهاية javax.faces.resource مع حمولات مشفرة
6. نشر توقيعات IDS/IPS لأنماط حقن EL في PrimeFaces
7. تنفيذ تسجيل على مستوى التطبيق لكشف محاولات تقييم تعبيرات EL

الضوابط التعويضية:
8. تقييد الوصول الشبكي للتطبيقات المتأثرة باستخدام تجزئة الشبكة
9. تنفيذ قواعد WAF لفحص وحظر كائنات Java المتسلسلة في طلبات HTTP
10. تفعيل حماية التطبيقات الذاتية أثناء التشغيل (RASP) إذا كانت متاحة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
2-3-1 (Vulnerability Management) 2-3-4 (Patch Management) 2-5-1 (Web Application Security) 2-2-3 (Encryption and Key Management)
🔵 SAMA CSF
3.3.3 (Patch Management) 3.3.5 (Vulnerability Management) 3.4.1 (Application Security) 3.3.7 (Cryptographic Controls)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.24 (Use of cryptography) A.8.9 (Configuration management) A.8.28 (Secure coding)
🟣 PCI DSS v4.0
6.2 (Ensure all system components are protected from known vulnerabilities) 6.5 (Address common coding vulnerabilities) 6.6 (Address new threats and vulnerabilities for public-facing web applications) 2.3 (Encrypt all non-console administrative access using strong cryptography)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Primetek:Primefaces Application
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS93.73%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-07-10
Published 2022-01-10
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.