Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.3
Datadog Java Agent: Remote Code Execution via RMI
GHSA-579q-h82j-r5v2
CVE-2026-33728
GHSA-579q-h82j-r5v2
Summary
The Datadog Java Agent, if not updated to version 1.60.3 or later, can allow an attacker to take control of a system if they have network access to a specific port and can find a way to exploit it. This is a serious risk, especially if the system is used to run critical applications. To fix it, update the agent to version 1.60.3 or later, or set an environment variable to disable RMI integration if you can't update.
What to do
- Update datadoghq com.datadoghq:dd-java-agent to version 1.60.3.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| datadoghq | com.datadoghq:dd-java-agent | > 0.40.0 , <= 1.60.3 | 1.60.3 |
Original title
dd-trace-java is a Datadog APM client for Java. In versions of dd-trace-java 0.40.0 through prior to 1.60.2, the RMI instrumentation registered a custom endpoint that deserialized incoming data wit...
Original description
dd-trace-java is a Datadog APM client for Java. In versions of dd-trace-java 0.40.0 through prior to 1.60.2, the RMI instrumentation registered a custom endpoint that deserialized incoming data without applying serialization filters. On JDK version 16 and earlier, an attacker with network access to a JMX or RMI port on an instrumented JVM could exploit this to potentially achieve remote code execution. All three of the following conditions must be true to exploit this vulnerability: First, dd-trace-java is attached as a Java agent (`-javaagent`) on Java 16 or earlier. Second, a JMX/RMI port has been explicitly configured via `-Dcom.sun.management.jmxremote.port` and is network-reachable, Third, a gadget-chain-compatible library is present on the classpath. For JDK >= 17, no action is required, but upgrading is strongly encouraged. For JDK >= 8u121 < JDK 17, upgrade to dd-trace-java version 1.60.3 or later. For JDK < 8u121 and earlier where serialization filters are not available, apply the workaround. The workaround is to set the following environment variable to disable the RMI integration: `DD_INTEGRATION_RMI_ENABLED=false`.
ghsa CVSS4.0
9.3
Vulnerability type
CWE-502
Deserialization of Untrusted Data
Published: 27 Mar 2026 · Updated: 27 Mar 2026 · First seen: 26 Mar 2026