CVE-2024-6960

7.5 HIGH

📋 TL;DR

CVE-2024-6960 is a Java deserialization vulnerability in the H2O machine learning platform that allows remote code execution when malicious models are imported. Attackers can craft Iced-format models containing dangerous Java gadget chains that execute arbitrary code during deserialization. Organizations using H2O for machine learning workflows are affected.

💻 Affected Systems

Products:
  • H2O machine learning platform
Versions: All versions prior to patched release
Operating Systems: All platforms running H2O
Default Config Vulnerable: ⚠️ Yes
Notes: Any H2O deployment accepting external model imports is vulnerable. The vulnerability exists in the core deserialization mechanism.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the H2O cluster, potentially leading to data theft, lateral movement, and persistent backdoors.

🟠

Likely Case

Remote code execution on H2O cluster nodes, allowing data exfiltration, cryptocurrency mining, or ransomware deployment.

🟢

If Mitigated

Limited impact with proper network segmentation and model validation, potentially only affecting isolated H2O instances.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

JFrog published technical details and proof-of-concept. Java deserialization attacks are well-understood with available gadget chains.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check H2O security advisory for specific version

Vendor Advisory: https://research.jfrog.com/vulnerabilities/h2o-model-deserialization-rce-jfsa-2024-001035518/

Restart Required: Yes

Instructions:

1. Check H2O security advisory for patched version. 2. Update H2O platform to patched version. 3. Restart all H2O services. 4. Validate model import functionality.

🔧 Temporary Workarounds

Restrict Model Imports

all

Disable or restrict external model import functionality in H2O configuration

Configure H2O to only accept models from trusted sources

Network Segmentation

all

Isolate H2O cluster from internet and untrusted networks

Implement firewall rules to restrict access to H2O ports

🧯 If You Can't Patch

  • Implement strict network controls to isolate H2O from untrusted networks
  • Establish rigorous model validation process and only import models from trusted sources

🔍 How to Verify

Check if Vulnerable:

Check H2O version against security advisory. If using unpatched version and accepting external models, assume vulnerable.

Check Version:

Check H2O web interface or configuration files for version information

Verify Fix Applied:

Verify H2O version is updated to patched release and test model import functionality with validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual model import activity
  • Java deserialization errors
  • Unexpected process execution

Network Indicators:

  • Suspicious connections to H2O model import endpoints
  • Unusual outbound traffic from H2O nodes

SIEM Query:

source="h2o" AND (event="model_import" OR error="deserialization")

🔗 References

📤 Share & Export