CVE-2022-21449
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.2 and 18; Oracle GraalVM Enterprise Edition: 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
Published
2022-04-19T21:15:16.127
Last Modified
2024-11-21T06:44:43.570
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 7.5 (HIGH)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:N/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: NONE
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
10.0
Impact Score
2.9
Weaknesses
-
Type: Primary
NVD-CWE-noinfo
Affected Vendors & Products
References
-
http://www.openwall.com/lists/oss-security/2022/04/28/2
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/28/3
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/28/4
Mailing List
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/28/5
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/28/6
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/28/7
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/29/1
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/30/1
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/30/2
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/30/3
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/30/4
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/05/01/1
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/05/01/2
Mailing List, Third Party Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/05/02/1
Mailing List, Third Party Advisory
([email protected])
-
https://security.netapp.com/advisory/ntap-20220429-0006/
Third Party Advisory
([email protected])
-
https://www.debian.org/security/2022/dsa-5128
Third Party Advisory
([email protected])
-
https://www.debian.org/security/2022/dsa-5131
Third Party Advisory
([email protected])
-
https://www.oracle.com/security-alerts/cpuapr2022.html
Patch, Vendor Advisory
([email protected])
-
http://www.openwall.com/lists/oss-security/2022/04/28/2
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/28/3
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/28/4
Mailing List
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/28/5
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/28/6
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/28/7
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/29/1
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/30/1
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/30/2
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/30/3
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/04/30/4
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/05/01/1
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/05/01/2
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.openwall.com/lists/oss-security/2022/05/02/1
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.netapp.com/advisory/ntap-20220429-0006/
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2022/dsa-5128
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2022/dsa-5131
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.oracle.com/security-alerts/cpuapr2022.html
Patch, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)