Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-20921: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. in Oracle Corporation Java SE JDK and JRE

0
Medium
VulnerabilityCVE-2024-20921cvecve-2024-20921
Published: Sat Feb 17 2024 (02/17/2024, 01:50:10 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Java SE JDK and JRE

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

AI-Powered Analysis

AILast updated: 11/03/2025, 23:45:49 UTC

Technical Analysis

CVE-2024-20921 is a vulnerability in the Hotspot component of Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition affecting multiple versions including Java SE 8u391, 11.0.21, 17.0.9, and 21.0.1, as well as GraalVM versions 20.3.12 through 22.3.4. The flaw allows an unauthenticated attacker with network access to exploit APIs exposed by the Hotspot component via multiple protocols. This can lead to unauthorized access to critical data or complete access to all data accessible through the affected Java runtimes. The vulnerability is particularly relevant for Java deployments that run sandboxed Java Web Start applications or sandboxed applets that load untrusted code from the internet and rely on the Java sandbox for security. The attack vector requires network access but no privileges or user interaction, though the vulnerability is rated as difficult to exploit due to the complexity of triggering the flaw. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) indicates network attack vector, high attack complexity, no privileges or user interaction required, unchanged scope, and high confidentiality impact without affecting integrity or availability. No public exploits or active exploitation have been reported to date. The vulnerability is related to CWE-276 (Incorrect Default Permissions), suggesting that improper access controls or permissions in the Hotspot component's API handling may be the root cause. This vulnerability poses a risk to any organization running affected Java versions, especially those exposing Java-based services or applications to untrusted networks or the internet.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive or critical data processed or stored by Java applications running on affected versions. Since Java SE and GraalVM are widely used in enterprise environments for backend services, middleware, and client applications, exploitation could compromise confidential business information, intellectual property, or personally identifiable information (PII). The impact is primarily on confidentiality, with no direct integrity or availability effects. However, unauthorized data access could facilitate further attacks or data breaches. Organizations running sandboxed Java Web Start applications or applets that load untrusted code are particularly at risk if these applications are exposed to external networks. The medium severity and difficulty of exploitation reduce the immediate risk but do not eliminate it, especially in high-value or regulated sectors such as finance, healthcare, and government. Failure to address this vulnerability could result in non-compliance with data protection regulations like GDPR if sensitive data is exposed. The lack of known exploits in the wild provides a window for proactive mitigation.

Mitigation Recommendations

1. Apply official patches or updates from Oracle as soon as they become available for all affected Java SE and GraalVM versions. 2. If patches are not yet available, restrict network access to Java services and APIs, especially those exposed externally or to untrusted networks. Use network segmentation and firewall rules to limit exposure. 3. Review and harden Java sandbox configurations to minimize the risk from untrusted code execution, including disabling Java Web Start and applets if not required. 4. Audit and restrict API permissions and access controls in the Hotspot component and related Java services to ensure least privilege principles are enforced. 5. Monitor network traffic and logs for unusual access patterns or attempts to exploit Java APIs. 6. Educate developers and system administrators about the risks of loading untrusted code and encourage secure coding and deployment practices. 7. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions that can detect anomalous Java runtime behavior. 8. Maintain an inventory of all Java versions in use across the organization to ensure no vulnerable versions remain in production or development environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.620Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092618fe7723195e0b37ce

Added to database: 11/3/2025, 10:00:56 PM

Last enriched: 11/3/2025, 11:45:49 PM

Last updated: 11/5/2025, 2:35:23 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats