CVE-2025-30698: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. in Oracle Corporation Oracle Java SE
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition: 20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
AI Analysis
Technical Summary
CVE-2025-30698 is a vulnerability in the 2D component of Oracle Java SE and Oracle GraalVM products, including Oracle Java SE versions 8u441, 11.0.26, 17.0.14, 21.0.6, and 24, as well as Oracle GraalVM for JDK and Enterprise Edition versions 20.3.17 and 21.3.13. The flaw allows an unauthenticated attacker with network access to exploit multiple protocols to compromise the affected Java runtimes. The vulnerability arises from improper access control (CWE-284) in the Java sandbox environment, which is designed to isolate untrusted code such as Java Web Start applications or applets loaded from the internet. Successful exploitation can lead to unauthorized read and write operations on accessible data within the Java environment, including update, insert, or delete actions, and can also cause a partial denial of service. The vulnerability does not affect server-side Java deployments that only run trusted code installed by administrators. The attack complexity is high, requiring network access but no authentication or user interaction. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) indicates network attack vector, high attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability. No public exploits or patches are currently available, but affected organizations should monitor Oracle advisories closely and prepare to apply updates once released.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to client-side Java applications that load untrusted code, such as legacy Java Web Start applications or sandboxed applets used in internal or partner-facing tools. Exploitation could lead to unauthorized data manipulation or disclosure within the Java runtime environment, potentially compromising sensitive data or application integrity. Partial denial of service could disrupt business operations relying on Java clients. Although the impact is limited compared to server-side vulnerabilities, organizations in sectors with heavy Java client usage—such as financial services, manufacturing, and government—may face operational risks. The difficulty of exploitation and lack of known active exploits reduce immediate threat levels, but the widespread use of Oracle Java SE and GraalVM in Europe means many endpoints could be vulnerable if exposed to untrusted networks. This is especially relevant for organizations that have not yet migrated away from Java Web Start or applets and still rely on these technologies for legacy applications.
Mitigation Recommendations
Organizations should inventory their use of Oracle Java SE and GraalVM versions to identify affected deployments, focusing on client-side environments running sandboxed Java Web Start applications or applets. Immediate mitigation includes restricting network access to these Java clients, especially blocking untrusted or internet-facing network traffic to prevent exploitation. Administrators should disable or remove Java Web Start and applet support where possible, migrating legacy applications to modern, supported technologies. Applying Oracle security patches promptly once available is critical. Additionally, implementing network segmentation and endpoint protection can reduce exposure. Monitoring network traffic for unusual protocol activity targeting Java clients can help detect attempted exploitation. Educating users about the risks of running untrusted Java code and enforcing strict code signing policies will further reduce risk. Finally, organizations should review and harden Java sandbox configurations to limit the potential impact of any exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-30698: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. in Oracle Corporation Oracle Java SE
Description
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition: 20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
AI-Powered Analysis
Technical Analysis
CVE-2025-30698 is a vulnerability in the 2D component of Oracle Java SE and Oracle GraalVM products, including Oracle Java SE versions 8u441, 11.0.26, 17.0.14, 21.0.6, and 24, as well as Oracle GraalVM for JDK and Enterprise Edition versions 20.3.17 and 21.3.13. The flaw allows an unauthenticated attacker with network access to exploit multiple protocols to compromise the affected Java runtimes. The vulnerability arises from improper access control (CWE-284) in the Java sandbox environment, which is designed to isolate untrusted code such as Java Web Start applications or applets loaded from the internet. Successful exploitation can lead to unauthorized read and write operations on accessible data within the Java environment, including update, insert, or delete actions, and can also cause a partial denial of service. The vulnerability does not affect server-side Java deployments that only run trusted code installed by administrators. The attack complexity is high, requiring network access but no authentication or user interaction. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) indicates network attack vector, high attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability. No public exploits or patches are currently available, but affected organizations should monitor Oracle advisories closely and prepare to apply updates once released.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to client-side Java applications that load untrusted code, such as legacy Java Web Start applications or sandboxed applets used in internal or partner-facing tools. Exploitation could lead to unauthorized data manipulation or disclosure within the Java runtime environment, potentially compromising sensitive data or application integrity. Partial denial of service could disrupt business operations relying on Java clients. Although the impact is limited compared to server-side vulnerabilities, organizations in sectors with heavy Java client usage—such as financial services, manufacturing, and government—may face operational risks. The difficulty of exploitation and lack of known active exploits reduce immediate threat levels, but the widespread use of Oracle Java SE and GraalVM in Europe means many endpoints could be vulnerable if exposed to untrusted networks. This is especially relevant for organizations that have not yet migrated away from Java Web Start or applets and still rely on these technologies for legacy applications.
Mitigation Recommendations
Organizations should inventory their use of Oracle Java SE and GraalVM versions to identify affected deployments, focusing on client-side environments running sandboxed Java Web Start applications or applets. Immediate mitigation includes restricting network access to these Java clients, especially blocking untrusted or internet-facing network traffic to prevent exploitation. Administrators should disable or remove Java Web Start and applet support where possible, migrating legacy applications to modern, supported technologies. Applying Oracle security patches promptly once available is critical. Additionally, implementing network segmentation and endpoint protection can reduce exposure. Monitoring network traffic for unusual protocol activity targeting Java clients can help detect attempted exploitation. Educating users about the risks of running untrusted Java code and enforcing strict code signing policies will further reduce risk. Finally, organizations should review and harden Java sandbox configurations to limit the potential impact of any exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2025-03-25T20:11:18.263Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69091547c28fd46ded7bb641
Added to database: 11/3/2025, 8:49:11 PM
Last enriched: 11/3/2025, 9:16:47 PM
Last updated: 12/20/2025, 2:16:07 AM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8065: CWE-400 Uncontrolled Resource Consumption in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14300: CWE-306 Missing Authentication for Critical Function in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-14299: CWE-770 Allocation of Resources Without Limits or Throttling in TP-Link Systems Inc. Tapo C200 V3
HighCVE-2025-68613: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n
CriticalCVE-2023-53959: Uncontrolled Search Path Element in filezilla-project FileZilla Client
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.