Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-20945: Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. in Oracle Corporation Java SE JDK and JRE

0
Medium
VulnerabilityCVE-2024-20945cvecve-2024-20945
Published: Sat Feb 17 2024 (02/17/2024, 01:50:15 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Java SE JDK and JRE

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).

AI-Powered Analysis

AILast updated: 11/03/2025, 23:46:16 UTC

Technical Analysis

CVE-2024-20945 is a vulnerability in the security component of Oracle Java SE and Oracle GraalVM platforms, including both standard and enterprise editions. It affects a broad range of versions: Oracle Java SE 8u391, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK 17.0.9, 21.0.1; and Oracle GraalVM Enterprise Edition 20.3.12, 21.3.8, and 22.3.4. The vulnerability is characterized as difficult to exploit, requiring a low privileged attacker to have authenticated access to the infrastructure where these Java runtimes execute. The attack vector is local (AV:L), with high attack complexity (AC:H), and requires low privileges (PR:L) but no user interaction (UI:N). Successful exploitation can lead to unauthorized access to critical or all accessible data within the Java runtime environment, impacting confidentiality (CVSS 3.1 base score 4.7). The vulnerability can be exploited through APIs in the security component, for example via web services that supply data to these APIs. It also applies to Java deployments that run sandboxed Java Web Start applications or applets loading untrusted code, relying on the Java sandbox for security. The vulnerability does not affect integrity or availability, and no known exploits have been reported in the wild. Given the complexity and requirement for local access, exploitation is non-trivial but possible in environments where attackers have some foothold.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality of sensitive data processed or stored within Java SE and GraalVM environments. Organizations running affected Java versions in critical applications, middleware, or backend services could face unauthorized data disclosure if attackers gain low privileged access to the infrastructure. This is particularly concerning for sectors with high data sensitivity such as finance, healthcare, and government. The vulnerability could be leveraged in multi-stage attacks where initial access is obtained through other means, then escalated to access critical Java runtime data. Although the vulnerability does not impact integrity or availability, unauthorized data access can lead to compliance violations under GDPR and other data protection regulations, resulting in legal and reputational damage. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially in complex enterprise environments with multiple Java-based services.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Apply Oracle's security patches or updates for all affected Java SE and GraalVM versions as soon as they become available to eliminate the vulnerability. 2) Restrict and monitor access to infrastructure hosting Java runtimes, ensuring that only trusted and authorized users have logon capabilities, thereby reducing the attack surface. 3) Harden Java runtime configurations by disabling or limiting use of vulnerable APIs where feasible, especially in web services that accept external data inputs. 4) For environments running sandboxed Java Web Start applications or applets, enforce strict code signing and validation policies to prevent execution of untrusted code. 5) Employ network segmentation and application-layer controls to isolate critical Java-based services from less trusted network zones. 6) Monitor logs and audit trails for unusual access patterns or API usage indicative of exploitation attempts. 7) Conduct regular security assessments and penetration tests focusing on Java runtime environments to identify potential exploitation paths. These targeted actions go beyond generic advice by focusing on access control, runtime hardening, and proactive detection tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.626Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092618fe7723195e0b37d2

Added to database: 11/3/2025, 10:00:56 PM

Last enriched: 11/3/2025, 11:46:16 PM

Last updated: 11/5/2025, 2:12:49 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats