<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>H2o-3 (&lt;= 7402) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/h2o-3--7402/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 17 May 2026 12:17:58 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/h2o-3--7402/feed.xml" rel="self" type="application/rss+xml"/><item><title>Deserialization Vulnerability in H2Oai H2O-3 (CVE-2026-8751)</title><link>https://feed.craftedsignal.io/briefs/2026-05-h2oai-deserialization/</link><pubDate>Sun, 17 May 2026 12:17:58 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-h2oai-deserialization/</guid><description>A deserialization vulnerability exists in h2oai's h2o-3 up to version 7402, specifically within the importBinaryModel function of the h2o-core/src/main/java/hex/Model.java file's JAR Handler component, allowing remote exploitation through manipulation.</description><content:encoded><![CDATA[<p>A deserialization vulnerability, identified as CVE-2026-8751, has been discovered in h2oai&rsquo;s h2o-3, affecting versions up to 7402. The vulnerability resides within the <code>importBinaryModel</code> function in the <code>h2o-core/src/main/java/hex/Model.java</code> file, specifically in the JAR Handler component. This flaw allows remote attackers to perform manipulation that leads to deserialization, potentially allowing for arbitrary code execution. The exploit is publicly available, increasing the risk of exploitation. The vendor was contacted regarding this vulnerability but did not respond. Due to the ease of exploitation and potential impact, this vulnerability poses a significant risk to systems running affected versions of h2o-3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable h2o-3 instance running a version &lt;= 7402.</li>
<li>Attacker crafts a malicious serialized object designed to exploit the <code>importBinaryModel</code> function.</li>
<li>Attacker sends a request to the vulnerable h2o-3 instance, providing the malicious serialized object to the <code>importBinaryModel</code> function.</li>
<li>The <code>importBinaryModel</code> function attempts to deserialize the object.</li>
<li>Due to the vulnerability, the deserialization process executes arbitrary code embedded within the malicious object.</li>
<li>The attacker gains control of the h2o-3 instance, potentially with the privileges of the user running the application.</li>
<li>The attacker can then use this access to pivot to other systems, exfiltrate data, or cause further damage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8751 can lead to arbitrary code execution on the affected h2o-3 instance. This can result in complete system compromise, including the potential for data theft, system disruption, or further lateral movement within the network. Given the public availability of the exploit, organizations using vulnerable versions of h2o-3 are at immediate risk. The absence of a vendor response or patch exacerbates the situation, leaving organizations with limited options for remediation beyond mitigation strategies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply network access controls to restrict access to the h2o-3 service to only authorized users and systems.</li>
<li>Deploy the Sigma rule <code>Detect Deserialization Attempt in H2Oai H2O-3 (CVE-2026-8751)</code> to identify potential exploitation attempts in web server logs.</li>
<li>Monitor network traffic for unusual patterns that may indicate exploitation attempts, using network connection logs.</li>
<li>Implement input validation and sanitization measures to prevent the injection of malicious serialized objects.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>deserialization</category><category>rce</category><category>cve</category></item></channel></rss>