PatchSiren cyber security CVE debrief
CVE-2017-5586 Opentext CVE debrief
CVE-2017-5586 is a critical remote command execution issue in OpenText Documentum D2 4.x. According to the official record, a remote attacker can execute arbitrary commands by sending a crafted serialized Java object, with references to BeanShell and Apache Commons Collections libraries. Because the issue is network-reachable, requires no privileges, and needs no user interaction, exposed D2 instances should be treated as high-risk assets.
- Vendor
- Opentext
- Product
- CVE-2017-5586
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-22
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-22
- Advisory updated
- 2026-05-13
Who should care
Security teams, application owners, platform administrators, and incident responders responsible for OpenText Documentum D2 deployments, especially versions 4.0 through 4.6 and any internet-facing or broadly reachable instances.
Technical summary
The official NVD record maps this issue to OpenText Documentum D2 versions 4.0 through 4.6 and assigns CVSS 3.0 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The description states that remote attackers can execute arbitrary commands via a crafted serialized Java object, with the issue related to BeanShell (bsh) and Apache Commons Collections (ACC) libraries. NVD lists CWE-20. Defensively, this should be treated as a likely unsafe input-handling/deserialization path in a Java application surface, with full compromise potential if reachable.
Defensive priority
Immediate and critical. This is a network exploitable issue with no authentication or user interaction required and full confidentiality, integrity, and availability impact in the published CVSS vector. Prioritize any exposed Documentum D2 4.x instance, especially externally reachable deployments, for urgent remediation or isolation.
Recommended defensive actions
- Inventory all OpenText Documentum D2 deployments and confirm whether any instance is running versions 4.0 through 4.6.
- Treat internet-facing or otherwise reachable D2 systems as emergency remediation targets.
- Restrict network access to D2 to trusted administrative or application paths only until remediation is complete.
- Follow the applicable OpenText remediation guidance for affected D2 versions and apply the vendor fix or upgrade path when available.
- Monitor logs and surrounding telemetry for signs of unexpected command execution, unusual process launches, or suspicious Java serialization activity.
- If immediate remediation is not possible, isolate affected systems and reduce exposure with compensating controls such as strict allowlisting and segmentation.
- Validate whether any connected credentials, application secrets, or host-level access may have been exposed and rotate them if compromise is suspected.
Evidence notes
This debrief is based on the official CVE/NVD record supplied in the corpus. The NVD entry lists the vulnerable product as OpenText Documentum D2 4.0 through 4.6, CVSS 3.0 9.8, and CWE-20. The supplied references also include third-party exploit/advisory links (Packet Storm, Exploit-DB, SecurityFocus) that provide additional context, but they should be treated as contextual references rather than proof of exploitation in any specific environment. No KEV listing was supplied.
Official resources
-
CVE-2017-5586 CVE record
CVE.org
-
CVE-2017-5586 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory, VDB Entry
- Source reference
-
Mitigation or vendor reference
[email protected] - Exploit, Third Party Advisory, VDB Entry
The CVE was published on 2017-02-22. The supplied corpus shows a later NVD modification timestamp of 2026-05-13, but that does not change the original vulnerability publication date. No KEV entry was supplied.