Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30698: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. in Oracle Corporation Oracle Java SE

0
Medium
VulnerabilityCVE-2025-30698cvecve-2025-30698
Published: Tue Apr 15 2025 (04/15/2025, 20:31:05 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Java SE

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition: 20.3.17 and 21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).

AI-Powered Analysis

AILast updated: 11/03/2025, 21:16:47 UTC

Technical Analysis

CVE-2025-30698 is a vulnerability in the 2D component of Oracle Java SE and Oracle GraalVM products, including Oracle Java SE versions 8u441, 11.0.26, 17.0.14, 21.0.6, and 24, as well as Oracle GraalVM for JDK and Enterprise Edition versions 20.3.17 and 21.3.13. The flaw allows an unauthenticated attacker with network access to exploit multiple protocols to compromise the affected Java runtimes. The vulnerability arises from improper access control (CWE-284) in the Java sandbox environment, which is designed to isolate untrusted code such as Java Web Start applications or applets loaded from the internet. Successful exploitation can lead to unauthorized read and write operations on accessible data within the Java environment, including update, insert, or delete actions, and can also cause a partial denial of service. The vulnerability does not affect server-side Java deployments that only run trusted code installed by administrators. The attack complexity is high, requiring network access but no authentication or user interaction. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L) indicates network attack vector, high attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability. No public exploits or patches are currently available, but affected organizations should monitor Oracle advisories closely and prepare to apply updates once released.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to client-side Java applications that load untrusted code, such as legacy Java Web Start applications or sandboxed applets used in internal or partner-facing tools. Exploitation could lead to unauthorized data manipulation or disclosure within the Java runtime environment, potentially compromising sensitive data or application integrity. Partial denial of service could disrupt business operations relying on Java clients. Although the impact is limited compared to server-side vulnerabilities, organizations in sectors with heavy Java client usage—such as financial services, manufacturing, and government—may face operational risks. The difficulty of exploitation and lack of known active exploits reduce immediate threat levels, but the widespread use of Oracle Java SE and GraalVM in Europe means many endpoints could be vulnerable if exposed to untrusted networks. This is especially relevant for organizations that have not yet migrated away from Java Web Start or applets and still rely on these technologies for legacy applications.

Mitigation Recommendations

Organizations should inventory their use of Oracle Java SE and GraalVM versions to identify affected deployments, focusing on client-side environments running sandboxed Java Web Start applications or applets. Immediate mitigation includes restricting network access to these Java clients, especially blocking untrusted or internet-facing network traffic to prevent exploitation. Administrators should disable or remove Java Web Start and applet support where possible, migrating legacy applications to modern, supported technologies. Applying Oracle security patches promptly once available is critical. Additionally, implementing network segmentation and endpoint protection can reduce exposure. Monitoring network traffic for unusual protocol activity targeting Java clients can help detect attempted exploitation. Educating users about the risks of running untrusted Java code and enforcing strict code signing policies will further reduce risk. Finally, organizations should review and harden Java sandbox configurations to limit the potential impact of any exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
oracle
Date Reserved
2025-03-25T20:11:18.263Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091547c28fd46ded7bb641

Added to database: 11/3/2025, 8:49:11 PM

Last enriched: 11/3/2025, 9:16:47 PM

Last updated: 12/20/2025, 2:16:07 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats