Listen to this Post
Akka’s cluster metrics module (akka-cluster-metrics) prior to version 2.10.6 relies on Java serialization for transmitting metrics data between nodes. This insecure deserialization mechanism allows attackers to exploit untrusted data streams, potentially executing arbitrary code when maliciously crafted metrics are deserialized. The vulnerability stems from the lack of validation or sanitization during deserialization, enabling remote code execution (RCE) under certain conditions. Attackers could compromise cluster integrity by sending rogue serialized objects, leveraging the metrics communication channel.
DailyCVE Form:
Platform: Akka
Version: <2.10.6
Vulnerability: Insecure Deserialization
Severity: Moderate
Date: Jun 30, 2025
Prediction: Patch by Jul 15, 2025
What Undercode Say:
Check Akka version: akka-cluster-metrics --version Exploit PoC (simplified): java -jar ysoserial.jar CommonsCollections5 'cmd' | nc TARGET_IP 9999 Mitigation test: deserialization.filter.class=!
How Exploit:
- Send malicious serialized metrics to cluster nodes.
- Trigger RCE via crafted
ObjectInputStream
.
Protection from this CVE:
- Upgrade to Akka >=2.10.6.
- Replace Java serialization with JSON/Protobuf.
- Enable JVM deserialization filters.
Impact:
- Cluster takeover via RCE.
- Data integrity compromise.
Sources:
Reported By: github.com
Extra Source Hub:
Undercode