The reported issue is related to previously discovered and addressed vulnerability: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1295
The vulnerability can be exploited if the one sends a specially prepared form of a serialized object to one of the deserialization endpoints of some Ignite components.
It was noticed that some results ended up in the `GridClientJdkMarshaller`, which is not protected by the measures that you put in place in CVE-2018-1295:
It looks like most of the results go through a polymorphic call of this following function (i.e., from the 4th result):
Has to be mitigated using the same approach as in CVE-2018-1295.
Use the following CVE when will be reporting to Mitre: CVE-2018-8018