{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/jndi/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":9,"id":"CVE-2021-45046"}],"_cs_exploited":true,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["jndi","java","log4shell","rce","exploitation"],"_cs_type":"threat","_cs_vendors":[],"content_html":"\u003cp\u003eThis detection rule identifies potential exploitation attempts targeting Java Naming and Directory Interface (JNDI) vulnerabilities. These vulnerabilities, exemplified by CVE-2021-45046, allow attackers to perform remote code execution by injecting malicious payloads through directory services like LDAP. The rule focuses on detecting suspicious outbound network connections from Java processes to standard ports associated with LDAP (389, 1389), RMI (1099), and DNS (53, 5353), followed by the execution of suspicious child processes indicative of command execution such as shell interpreters (sh, bash, zsh) or scripting languages (python, perl). The rule aims to identify exploitation attempts similar to those seen with Log4Shell and related vulnerabilities, which have been actively exploited since late 2021. It covers Linux and macOS environments and provides a mechanism to detect ongoing exploitation.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eA vulnerable Java application receives malicious input containing a JNDI lookup string.\u003c/li\u003e\n\u003cli\u003eThe Java application attempts to resolve the JNDI name, initiating an outbound network connection to an LDAP, RMI, or DNS server on ports 389, 1389, 1099, 53, or 5353.\u003c/li\u003e\n\u003cli\u003eThe malicious LDAP/RMI/DNS server, controlled by the attacker, responds with a payload referencing a malicious Java class or remote code.\u003c/li\u003e\n\u003cli\u003eThe Java application loads and executes the malicious code.\u003c/li\u003e\n\u003cli\u003eAs a result of the executed code, a shell interpreter (sh, bash, zsh, etc.) or scripting language (python, perl, ruby, php, wget) is spawned as a child process of the Java application.\u003c/li\u003e\n\u003cli\u003eThe spawned shell/script executes attacker-controlled commands for reconnaissance, privilege escalation, or lateral movement.\u003c/li\u003e\n\u003cli\u003eThe attacker gains a foothold on the system.\u003c/li\u003e\n\u003cli\u003eThe attacker performs actions such as data exfiltration or deploying malware.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of JNDI vulnerabilities can lead to remote code execution, allowing attackers to gain complete control over affected systems. This can result in data breaches, system compromise, and further propagation of attacks within the network. The impact can range from service disruption to complete system takeover. Public exploits for vulnerabilities such as Log4Shell have been widely available, leading to widespread scanning and exploitation attempts across various industries.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eDeploy the Sigma rule \u0026ldquo;Potential JAVA/JNDI Exploitation Attempt\u0026rdquo; to your SIEM to detect suspicious Java processes initiating network connections to LDAP, RMI, or DNS ports followed by suspicious child processes.\u003c/li\u003e\n\u003cli\u003eEnable process creation and network connection logging on Linux and macOS endpoints to provide the necessary data for the Sigma rules to function correctly.\u003c/li\u003e\n\u003cli\u003eReview and whitelist legitimate Java applications that may trigger false positives due to legitimate network connections (see the \u0026ldquo;False positive analysis\u0026rdquo; section in the original rule\u0026rsquo;s \u003ccode\u003enote\u003c/code\u003e field).\u003c/li\u003e\n\u003cli\u003eImplement network segmentation to limit the impact of successful exploitation by restricting lateral movement.\u003c/li\u003e\n\u003cli\u003ePatch vulnerable Java applications and libraries, such as Log4j, to prevent exploitation of known vulnerabilities like CVE-2021-45046.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-04-01T14:24:53Z","date_published":"2026-04-01T14:24:53Z","id":"/briefs/2026-06-java-jndi-exploitation/","summary":"This rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.","title":"Potential JAVA/JNDI Exploitation Attempt","url":"https://feed.craftedsignal.io/briefs/2026-06-java-jndi-exploitation/"}],"language":"en","title":"CraftedSignal Threat Feed — Jndi","version":"https://jsonfeed.org/version/1.1"}