logback version 1.4.11 allows an attacker to mount a Denial-Of-Service
attack by sending poisoned data.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-3046 | A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data. |
![]() |
GHSA-vmq6-5m68-f53m | logback serialization vulnerability |
![]() |
USN-7616-1 | logback vulnerabilities |
Solution
Only environments where logback receiver component is deployed may be vulnerable. In case a logback receiver is deployed, restricting connections to trustworthy clients or upgrading to logback version 1.4.12 or later will remedy the vulnerability.
Workaround
Only environments where logback receiver is deployed are vulnerable.
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 29 Nov 2024 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 11 Oct 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2024-11-29T12:04:40.421Z
Reserved: 2023-11-29T10:18:07.523Z
Link: CVE-2023-6378

Updated: 2024-11-29T12:04:40.421Z

Status : Modified
Published: 2023-11-29T12:15:07.543
Modified: 2024-11-29T12:15:06.597
Link: CVE-2023-6378


No data.