Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-22081: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. in Oracle Corporation Java SE JDK and JRE

0
Medium
VulnerabilityCVE-2023-22081cvecve-2023-22081
Published: Tue Oct 17 2023 (10/17/2023, 21:02:56 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Java SE JDK and JRE

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf, 11.0.20, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8, 21; Oracle GraalVM Enterprise Edition: 20.3.11, 21.3.7 and 22.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

AI-Powered Analysis

AILast updated: 11/04/2025, 00:09:36 UTC

Technical Analysis

CVE-2023-22081 is a vulnerability in the Java Secure Socket Extension (JSSE) component of Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition. It affects multiple versions, including Oracle Java SE 8u381, 11.0.20, 17.0.8, and 21, as well as corresponding GraalVM versions. The flaw allows an unauthenticated attacker with network access over HTTPS to exploit the vulnerability without requiring user interaction or privileges. The vulnerability arises in environments where sandboxed Java Web Start applications or applets load and execute untrusted code from external sources, relying on the Java sandbox for security enforcement. Exploitation can lead to a partial denial of service, impacting the availability of the Java runtime environment. This vulnerability does not affect server-side Java deployments that only run trusted code installed by administrators. The attack vector is network-based with low complexity and no authentication required, but the impact is limited to availability with no confidentiality or integrity loss. Oracle has assigned a CVSS 3.1 base score of 5.3, indicating a medium severity level. No public exploits or active exploitation have been reported to date. The vulnerability underscores risks associated with legacy Java Web Start and applet technologies, which are increasingly deprecated but still present in some environments.

Potential Impact

For European organizations, the primary impact of CVE-2023-22081 is the potential for partial denial of service in client environments running sandboxed Java Web Start applications or applets that load untrusted code. This could disrupt business processes relying on such Java clients, causing downtime or degraded service availability. Since the vulnerability does not affect server-side Java deployments running trusted code, critical backend systems are less likely to be impacted. However, sectors that still utilize legacy Java client applications—such as certain financial services, manufacturing, or government agencies—may face operational interruptions. The partial DoS could also be leveraged as part of a broader attack chain to degrade user experience or availability of client-side tools. Given the unauthenticated network access vector, attackers could exploit this vulnerability remotely if the affected Java clients connect to malicious or compromised HTTPS servers. The lack of confidentiality or integrity impact limits data breach risks, but availability issues could affect compliance with service-level agreements and operational continuity. The absence of known exploits reduces immediate risk, but the ease of exploitation warrants timely remediation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Identify and inventory all Java SE and GraalVM client deployments, focusing on versions listed as affected (e.g., Oracle Java SE 8u381, 11.0.20, 17.0.8, 21, and corresponding GraalVM versions). 2) Apply Oracle's official patches or updates as soon as they become available to address CVE-2023-22081. 3) Where patching is not immediately feasible, restrict or disable the use of Java Web Start and applets that load untrusted code, especially from external or untrusted HTTPS sources. 4) Implement network-level controls such as HTTPS filtering, proxying, or allowlisting to prevent Java clients from connecting to untrusted or malicious servers. 5) Educate users and administrators about the risks of running untrusted Java code and encourage migration away from deprecated Java Web Start and applet technologies toward modern, secure application delivery methods. 6) Monitor client-side Java application logs and network traffic for unusual connection attempts or failures indicative of exploitation attempts. 7) Review and harden Java sandbox policies to minimize exposure to untrusted code execution. These targeted actions go beyond generic advice by focusing on client-side Java usage patterns and network controls relevant to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2022-12-17T19:26:00.759Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909262bfe7723195e0b5dd4

Added to database: 11/3/2025, 10:01:15 PM

Last enriched: 11/4/2025, 12:09:36 AM

Last updated: 11/6/2025, 12:41:28 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats