Submit a ticketCall us

WebinarDatabase Roundtable – Expert Database Professionals Feel Your Pain

In this video broadcast, Head Geek™ Tom LaRock is joined by Karen Lopez, Tim Chapman, and David Klee. They’ve known each other for many years, so this discussion was like four friends getting together to talk data and databases. They discussed diagnostic data collection, common performance root causes, reactive tuning versus proactive, and more. Join us for an engaging discussion on these topics! Plus, Tom LaRock will be available to answer your questions live.

Register now.

Home > Success Center > Virtualization Manager (VMAN) > VMAN - Knowledgebase Articles > JAVA JMX interface vulnerability

JAVA JMX interface vulnerability

Updated March 14, 2017


This article solves the JAVA JMX interface vulnerability.



VMAN 6.x.x


Details from the vulnerability report:

The Java Management extensions (JMX) service on this host does not require any authentication. The JMX/RMI service is used to monitor the Java Virtual Machine (JVM), but can also be used to register a new managed bean (MBean) from a remote URL using the "" function. Using this function, a remote, unauthenticated attacker can upload and run a JAR file containing arbitrary Java code of the attacker's choosing.

An attacker can execute arbitrary Java code running with the same privileges as the JMX/RMI process.


Note: This resolution will block the JMX ports in the appliance's firewall. Another option is to just block it elsewhere according to the customer's options.

Log in to the VMAN appliance using SSH and execute the following commands:
sudo iptables -A INPUT -p tcp --dport 1099 -s -d -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 1099 -j DROP

sudo iptables -A INPUT -p tcp --dport 9004 -s -d -j ACCEPT
sudo iptables -A INPUT -p tcp --dport 9004 -j DROP

sudo /etc/init.d/iptables save




Last modified