Lyrie
active-exploitation
ACTIVELY EXPLOITED3 sources verified·4 min read
By Lyrie Threat Intelligence·10/2/2025

What happened

CISA added CVE-2017-1000353 to the Known Exploited Vulnerabilities (KEV) catalog, signaling confirmed in-the-wild abuse of this Jenkins flaw CISA KEV. The vulnerability is remote code execution (RCE) in Jenkins, triggered through its remoting-based CLI deserialization path NVD entry. CISA’s entry directs organizations to apply vendor mitigations or discontinue use if mitigations are unavailable, in line with federal BOD 22-01 actioning timelines CISA KEV. The CVE details and identifier are tracked by MITRE and NVD under CVE-2017-1000353 MITRE CVE record.

Why it matters

RCE in a build server is a direct path to environment compromise because attackers can run arbitrary code under the Jenkins process context NVD entry. The issue stems from a logic flaw in deserialization defenses: a crafted Java SignedObject sent to the remoting-based CLI is deserialized using a new ObjectInputStream, evading an existing blocklist designed to prevent unsafe types NVD entry. KEV inclusion means threat actors are actively exploiting or have exploited the bug, elevating it from theoretical risk to operationally relevant exposure that defenders must prioritize CISA KEV.

Technical detail

The vulnerability allows an attacker to transfer a serialized Java SignedObject to Jenkins’ remoting-based CLI, which Jenkins then deserializes with a freshly constructed ObjectInputStream NVD entry. Because the stream is new, it bypasses the blocklist-based safeguards intended to prevent harmful gadget types from being materialized during deserialization NVD entry. This combination opens a path to execute attacker-controlled code on the Jenkins host if the payload leverages a suitable gadget chain reachable during that deserialization sequence MITRE CVE record.

The attack surface is explicitly the remoting-based Jenkins CLI, not arbitrary HTTP endpoints, which narrows where defenders should be monitoring and hardening NVD entry. KEV listing confirms adversaries have weaponized this path sufficiently to meet CISA’s exploitation bar, which changes patching priority from routine to urgent remediation CISA KEV. Canonical tracking data for this vulnerability, including assignment and references, is maintained by MITRE and synchronized to NVD under CVE-2017-1000353 MITRE CVE record.

Defense

  • Patch and vendor mitigations: Apply Jenkins’ vendor guidance and mitigations immediately, consistent with the KEV directive to remediate or discontinue use if mitigations are unavailable CISA KEV.
  • Expedite per policy: Treat this as a priority per CISA’s BOD 22-01-aligned guidance for KEV entries, not a routine maintenance window item CISA KEV.
  • Reduce exposure: Limit access to the remoting-based Jenkins CLI to trusted administrative paths only, since exploitation is via that interface rather than general web endpoints NVD entry.
  • Monitor and detect: Instrument for unexpected or anomalous invocations of the remoting-based CLI and for inbound serialized Java object streams targeting Jenkins, as the exploit hinges on deserialization via ObjectInputStream NVD entry. Given the blocklist bypass mechanism, assume class-name signatures alone are insufficient and prefer behavioral alerts tied to deserialization paths NVD entry.
  • Incident response: If exploitation is suspected, treat the Jenkins controller as compromised; rebuild from clean media and rotate credentials/tokens that could have been accessed by jobs or the controller, in line with the severity of RCE noted in public records MITRE CVE record.

Lyrie Verdict

CVE-2017-1000353 is a classic deserialization RCE on a deterministic management channel: the remoting-based Jenkins CLI NVD entry. Rogue automated agents can chain this into build-pipeline hijack fast; waiting on human triage forfeits the initiative CISA KEV. Lyrie instruments for protocol-aware anomalies and serialized-object flows bound for Jenkins CLI, auto-flagging ObjectInputStream deserialization patterns tied to this CVE and quarantining at machine speed before job runners become an attacker’s beachhead NVD entry.

Lyrie Verdict

Deterministic deserialization on Jenkins’ remoting CLI gives bots a trivial RCE path. Lyrie continuously inspects serialized-object flows to Jenkins CLI and auto-interdicts risky ObjectInputStream deserialization patterns tied to CVE-2017-1000353 at machine speed, cutting off rogue-AI exploitation windows before build infrastructure is commandeered.