INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h Global malware Financial Services, Mobile Payments HIGH 1h Global vulnerability Government and Critical Infrastructure CRITICAL 3h Global apt Cryptocurrency and Blockchain CRITICAL 11h Global malware Financial Services / Cryptocurrency CRITICAL 12h Global insider Cloud Computing and SaaS HIGH 13h Global vulnerability Industrial Control Systems / Operational Technology CRITICAL 13h Global ransomware Corporate/Enterprise CRITICAL 14h Global ransomware Retail/E-commerce HIGH 15h Global vulnerability Software Development and AI/ML Services CRITICAL 16h Global vulnerability Healthcare, Operational Technology, Industrial Control Systems CRITICAL 18h
Vulnerabilities

CVE-2021-35464

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
ForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability — ForgeRock Access Management (AM) Core Server allows an attacker who sends a specially crafted HTTP request to one of
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

ForgeRock Access Management (AM) Core Server Remote Code Execution Vulnerability — ForgeRock Access Management (AM) Core Server allows an attacker who sends a specially crafted HTTP request to one of three endpoints (/ccversion/Version, /ccversion/Masthead, or /ccversion/ButtonFrame) to execute code in the context of the current user (unless ForgeRock AM is running as root user, which the vendor does not recommend).

🤖 AI Executive Summary

ForgeRock Access Management (AM) Core Server contains a critical remote code execution vulnerability (CVSS 9.0) affecting three endpoints that allows unauthenticated attackers to execute arbitrary code through specially crafted HTTP requests. This vulnerability poses an immediate threat to organizations using ForgeRock AM for identity and access management, particularly in Saudi Arabia's banking and government sectors. Exploitation is trivial with publicly available exploits, making immediate patching essential.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 00:34
🇸🇦 Saudi Arabia Impact Assessment
Critical impact on Saudi banking sector (SAMA-regulated institutions) and government agencies (NCA oversight) relying on ForgeRock AM for identity federation and single sign-on. Telecom operators (STC, Mobily) using ForgeRock for customer authentication face immediate compromise risk. Healthcare organizations and ARAMCO subsidiaries using ForgeRock for employee access management are vulnerable to lateral movement and data exfiltration. The vulnerability allows complete system compromise without authentication, enabling attackers to access sensitive citizen data, financial records, and critical infrastructure credentials.
🏢 Affected Saudi Sectors
Banking and Financial Services (SAMA-regulated) Government and Public Administration (NCA oversight) Telecommunications (STC, Mobily, Zain) Healthcare and Medical Services Energy and Petroleum (ARAMCO subsidiaries) Insurance and Investment Education and Universities
⚖️ Saudi Risk Score (AI)
9.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all ForgeRock AM instances in your environment and document versions
2. Disable or restrict access to vulnerable endpoints (/ccversion/Version, /ccversion/Masthead, /ccversion/ButtonFrame) via WAF/reverse proxy rules
3. Implement network segmentation to limit ForgeRock AM exposure
4. Monitor access logs for exploitation attempts (HTTP requests to /ccversion/* endpoints)

PATCHING:
1. Apply ForgeRock AM security patches immediately (versions 6.5.3, 7.0.2, 7.1.1 or later)
2. Test patches in non-production environment first
3. Plan emergency maintenance window for production deployment
4. Verify patch application by confirming version numbers post-update

COMPENSATING CONTROLS (if patching delayed):
1. Deploy Web Application Firewall (WAF) rules blocking requests to /ccversion/* endpoints
2. Implement IP whitelisting for ForgeRock AM administrative access
3. Enable detailed logging and alerting on all ForgeRock AM access
4. Conduct immediate forensic analysis for signs of exploitation

DETECTION RULES:
1. Alert on HTTP requests to /ccversion/Version, /ccversion/Masthead, /ccversion/ButtonFrame
2. Monitor for unusual process execution from ForgeRock AM Java process
3. Track outbound connections from ForgeRock AM servers to external IPs
4. Monitor ForgeRock AM logs for authentication bypass or privilege escalation attempts
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع نسخ ForgeRock AM في بيئتك وتوثيق الإصدارات
2. تعطيل أو تقييد الوصول إلى نقاط النهاية الضعيفة عبر قواعد WAF/reverse proxy
3. تنفيذ تقسيم الشبكة لتحديد تعرض ForgeRock AM
4. مراقبة سجلات الوصول لمحاولات الاستغلال

التصحيح:
1. تطبيق تصحيحات أمان ForgeRock AM فوراً (الإصدارات 6.5.3 و 7.0.2 و 7.1.1 أو أحدث)
2. اختبار التصحيحات في بيئة غير الإنتاج أولاً
3. التخطيط لنافذة صيانة طارئة للنشر في الإنتاج
4. التحقق من تطبيق التصحيح بتأكيد أرقام الإصدار بعد التحديث

الضوابط البديلة:
1. نشر قواعد WAF لحجب الطلبات إلى نقاط نهاية /ccversion/*
2. تنفيذ قائمة بيضاء IP للوصول الإداري
3. تفعيل السجلات التفصيلية والتنبيهات
4. إجراء تحليل جنائي فوري للكشف عن علامات الاستغلال
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Access Control Policy (authentication bypass) ECC 2024 A.5.2.1 - User Registration and Access Rights Management ECC 2024 A.6.1.1 - Information Security Roles and Responsibilities ECC 2024 A.12.4.1 - Event Logging (detection and monitoring) ECC 2024 A.12.6.1 - Management of Technical Vulnerabilities
🔵 SAMA CSF
SAMA CSF ID.AM-2 - Asset Management (inventory of ForgeRock instances) SAMA CSF PR.AC-1 - Access Control Policy and Procedures SAMA CSF PR.PT-1 - Security Awareness and Training SAMA CSF DE.CM-1 - Detection Processes and Tools SAMA CSF RS.MI-1 - Incident Response Procedures
🟡 ISO 27001:2022
ISO 27001:2022 A.5.15 - Access Control (authentication mechanisms) ISO 27001:2022 A.8.1 - User Endpoint Devices (endpoint security) ISO 27001:2022 A.12.2.1 - Information and Communication Technology (ICT) Change Management ISO 27001:2022 A.12.6.1 - Management of Technical Vulnerabilities and Exposures ISO 27001:2022 A.16.1 - Planning of Information Security Incident Management
🟣 PCI DSS v4.0
PCI DSS 6.2 - Security Patches and Updates PCI DSS 6.5.1 - Injection Flaws Prevention PCI DSS 8.1 - User Access Control PCI DSS 10.2 - Logging and Monitoring
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
ForgeRock:Access Management (AM)
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS94.39%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2021-11-17
Published 2021-11-03
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.5
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited ransomware
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.