CVE-2022-21624

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
oracleCNA
3.7 LOW
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 29%
VendorProductVersion
oraclegraalvm
20.3.7
oraclegraalvm
21.3.3
oraclegraalvm
22.2.0
oraclejdk
1.8.0
oraclejdk
1.8.0
oraclejdk
11.0.16.1
oraclejdk
17.0.4.1
oraclejre
1.8.0
oraclejre
1.8.0
oraclejre
11.0.16.1
oraclejre
17.0.4.1
netapp7-mode_transition_tool
-
netappcloud_insights_acquisition_unit
-
netappcloud_secure_agent
-
netappe-series_santricity_os_controller
11.0 ≤
𝑥
≤ 11.70.2
netappe-series_santricity_storage_manager
-
netappe-series_santricity_unified_manager
-
netapponcommand_insight
-
netapponcommand_workflow_automation
-
netappsantricity_storage_plugin
-
netappsantricity_web_services_proxy
-
azulzulu
6.49
azulzulu
7.56
azulzulu
8.64
azulzulu
11.58
azulzulu
13.50
azulzulu
15.42
azulzulu
17.36
azulzulu
19.28
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openjdk-11
bullseye
11.0.24+8-2~deb11u1
fixed
bullseye (security)
11.0.25+9-1~deb11u1
fixed
sid
11.0.25+9-1
fixed
openjdk-17
bullseye
17.0.12+7-2~deb11u1
fixed
bullseye (security)
17.0.13+11-1~deb11u1
fixed
bookworm
17.0.12+7-2~deb12u1
fixed
bookworm (security)
17.0.13+11-2~deb12u1
fixed
sid
17.0.13+11-2
fixed
trixie
17.0.13+11-2
fixed
openjdk-8
sid
8u432-b06-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
icedtea-web
lunar
not-affected
kinetic
not-affected
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
openjdk-13
jammy
dne
focal
ignored
bionic
dne
xenial
dne
trusty
dne
openjdk-16
jammy
dne
focal
ignored
bionic
dne
xenial
dne
trusty
dne
openjdk-17
lunar
not-affected
kinetic
Fixed 17.0.5+8-2ubuntu1
released
jammy
Fixed 17.0.5+8-2ubuntu1~22.04
released
focal
Fixed 17.0.5+8-2ubuntu1~20.04
released
bionic
Fixed 17.0.5+8-2ubuntu1~18.04
released
xenial
dne
trusty
dne
openjdk-18
lunar
ignored
kinetic
ignored
jammy
ignored
focal
dne
bionic
dne
xenial
dne
trusty
dne
openjdk-19
lunar
not-affected
kinetic
Fixed 19.0.1+10-1
released
jammy
Fixed 19.0.1+10-1ubuntu1~22.04
released
focal
dne
bionic
dne
xenial
dne
trusty
dne
openjdk-8
lunar
not-affected
kinetic
Fixed 8u352-ga-1~22.10
released
jammy
Fixed 8u352-ga-1~22.04
released
focal
Fixed 8u352-ga-1~20.04
released
bionic
Fixed 8u352-ga-1~18.04
released
xenial
Fixed 8u352-ga-1~16.04
released
trusty
dne
openjdk-9
jammy
dne
focal
dne
bionic
dne
xenial
ignored
trusty
dne
openjdk-lts
lunar
not-affected
kinetic
Fixed 11.0.17+8-1ubuntu2
released
jammy
Fixed 11.0.17+8-1ubuntu2~22.04
released
focal
Fixed 11.0.17+8-1ubuntu2~20.04
released
bionic
Fixed 11.0.17+8-1ubuntu2~18.04
released
xenial
dne
trusty
dne
References