Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21235: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. in Oracle Corporation Oracle Java SE

0
Medium
VulnerabilityCVE-2024-21235cvecve-2024-21235
Published: Tue Oct 15 2024 (10/15/2024, 19:52:46 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Java SE

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 11/03/2025, 23:50:31 UTC

Technical Analysis

CVE-2024-21235 is a vulnerability identified in the Hotspot component of Oracle Java SE and Oracle GraalVM products, including Oracle Java SE versions 8u421 through 23, Oracle GraalVM for JDK versions 17.0.12 through 23, and Oracle GraalVM Enterprise Edition versions 20.3.15 and 21.3.11. The flaw allows an unauthenticated attacker with network access to exploit APIs exposed via multiple protocols, including web services, to gain unauthorized update, insert, or delete capabilities on some accessible data, as well as unauthorized read access to a subset of data. The vulnerability can also be exploited in Java deployments running sandboxed Java Web Start applications or sandboxed applets that load untrusted code, relying on the Java sandbox for security. The attack vector is network-based (AV:N), requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The impact affects confidentiality and integrity to a limited extent (C:L, I:L), with no impact on availability (A:N). The vulnerability is considered difficult to exploit, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights risks in environments where Java applications consume untrusted data or expose APIs over the network without adequate controls. Given the widespread use of Oracle Java SE and GraalVM in enterprise environments, this vulnerability could potentially expose sensitive data or allow unauthorized data manipulation if exploited.

Potential Impact

For European organizations, the impact of CVE-2024-21235 includes potential unauthorized disclosure and modification of data within applications running affected Oracle Java SE or GraalVM versions. This could lead to data integrity issues, compliance violations (e.g., GDPR), and potential downstream effects on business processes relying on Java-based services. Organizations with public-facing Java web services or those running sandboxed Java applications that load untrusted code are at higher risk. The vulnerability does not affect availability, so service disruption is unlikely. However, unauthorized data manipulation could undermine trust and lead to financial or reputational damage. Industries such as finance, telecommunications, government, and critical infrastructure in Europe that rely heavily on Java technologies could face targeted exploitation attempts. The difficulty of exploitation and lack of known active exploits reduce immediate risk but do not eliminate the need for proactive mitigation.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Apply Oracle's security patches promptly once available for all affected Java SE and GraalVM versions to eliminate the vulnerability. 2) Restrict network access to Java-based services and APIs, especially those exposed to untrusted networks, using firewalls, network segmentation, and access control lists. 3) Review and harden Java sandbox configurations to limit execution of untrusted code, including disabling Java Web Start and applets where possible. 4) Employ runtime application self-protection (RASP) or web application firewalls (WAF) to detect and block anomalous API calls that could exploit this vulnerability. 5) Conduct code reviews and security testing on Java applications that consume external data or expose APIs to ensure no insecure coding patterns exacerbate the risk. 6) Monitor logs and network traffic for unusual access patterns or unauthorized data modification attempts related to Java services. 7) Educate developers and system administrators on the risks of loading untrusted code in Java environments and enforce secure coding best practices. These measures go beyond generic advice by focusing on network-level controls, sandbox hardening, and proactive detection tailored to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.698Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909261cfe7723195e0b38a7

Added to database: 11/3/2025, 10:01:00 PM

Last enriched: 11/3/2025, 11:50:31 PM

Last updated: 12/14/2025, 8:57:49 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats