CVE-2022-21449

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.2 and 18; Oracle GraalVM Enterprise Edition: 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
oracleCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
VendorProductVersion
oraclegraalvm
21.3.1
oraclegraalvm
22.0.0.2
oraclejdk
17.0.2
debiandebian_linux
10.0
debiandebian_linux
11.0
netapp7-mode_transition_tool
-
netappactive_iq_unified_manager
-
netappactive_iq_unified_manager
-
netappcloud_insights
-
netappe-series_santricity_os_controller
11.0
netappe-series_santricity_storage_manager
-
netappe-series_santricity_web_services
-
netapponcommand_insight
-
netapponcommand_workflow_automation
-
netappsantricity_unified_manager
-
netappsolidfire\,_enterprise_sds_\&_hci_storage_node
-
netappsolidfire_\&_hci_management_node
-
netapphci_compute_node
-
azulzulu
15.38
azulzulu
17.32
azulzulu
18.28
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openjdk-17
bullseye
17.0.12+7-2~deb11u1
fixed
bullseye (security)
17.0.13+11-1~deb11u1
fixed
bookworm
17.0.12+7-2~deb12u1
fixed
bookworm (security)
17.0.13+11-2~deb12u1
fixed
sid
17.0.13+11-2
fixed
trixie
17.0.13+11-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
icedtea-web
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
dne
openjdk-13
lunar
dne
kinetic
dne
jammy
dne
impish
dne
focal
not-affected
bionic
dne
xenial
dne
trusty
dne
openjdk-16
lunar
dne
kinetic
dne
jammy
dne
impish
ignored
focal
ignored
bionic
dne
xenial
dne
trusty
dne
openjdk-17
lunar
Fixed 17.0.3+7-0ubuntu0.22.04.1
released
kinetic
Fixed 17.0.3+7-0ubuntu0.22.04.1
released
jammy
Fixed 17.0.3+7-0ubuntu0.22.04.1
released
impish
Fixed 17.0.3+7-0ubuntu0.21.10.1
released
focal
Fixed 17.0.3+7-0ubuntu0.20.04.1
released
bionic
Fixed 17.0.3+7-0ubuntu0.18.04.1
released
xenial
dne
trusty
dne
openjdk-18
lunar
not-affected
kinetic
Fixed 18.0.2+9-2
released
jammy
Fixed 18.0.2+9-2~22.04
released
impish
ignored
focal
dne
bionic
dne
xenial
dne
trusty
dne
openjdk-8
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
dne
openjdk-9
lunar
dne
kinetic
dne
jammy
dne
impish
dne
focal
dne
bionic
dne
xenial
not-affected
trusty
dne
openjdk-lts
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
focal
not-affected
bionic
not-affected
xenial
dne
trusty
dne
References