Oracle Java SE Vulnerability

MEDIUM (5.9) No Patch (59 days)

Threat Intelligence

Low Risk
EPSS Score: 0.07% chance of exploitation (percentile: 22%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

The Oracle Java SE is a widely used Java runtime environment that powers many applications. This vulnerability allows attackers to execute arbitrary code on your server by exploiting the security features of Java. If your app uses Java and logs user input, you're at risk.

Am I affected?

You're affected if you use:
- Oracle Java SE versions 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, or 25
Check with: find / -name "libjava.so" (Linux) or find %PROGRAMFILES% -name "jre*" (Windows)

Note: This vulnerability is specific to Oracle Java SE and not related to other Java implementations like OpenJDK.

Affected Packages

maven: org.openjdk.jdk

Affected Products

Oracle Corporation / Oracle Java SE

How to fix

Upgrade to Oracle Java SE 17.0.16 or later.
Maven: Update your pom.xml dependency version
If you can't upgrade immediately:
- Set java.security.manager.logging.fullySpecifiedFrags to true as a JVM flag
- Remove the javax management extension classes from your classpath