Skip to main content

CVE-2025-30749: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. in Oracle Corporation Oracle Java SE

High
VulnerabilityCVE-2025-30749cvecve-2025-30749
Published: Tue Jul 15 2025 (07/15/2025, 19:27:28 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Java SE

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).

AI-Powered Analysis

AILast updated: 07/22/2025, 20:49:05 UTC

Technical Analysis

CVE-2025-30749 is a high-severity vulnerability affecting multiple versions of Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition. The vulnerability resides in the 2D component of these products and allows an unauthenticated attacker with network access to exploit the flaw via multiple protocols. Although the vulnerability is described as difficult to exploit, a successful attack can lead to a complete takeover of the affected Java runtime environments. This includes compromising confidentiality, integrity, and availability of the system running the vulnerable Java versions. The vulnerability primarily impacts Java deployments that run untrusted code, such as sandboxed Java Web Start applications or sandboxed Java applets that load code from the internet and rely on the Java sandbox for security. It does not affect server-side Java deployments that only run trusted code installed by administrators. The CVSS 3.1 base score is 8.1, reflecting high impact with network attack vector, high attack complexity, no privileges required, no user interaction, and impacts across confidentiality, integrity, and availability. The vulnerability affects Oracle Java SE versions 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, and 24.0.1, as well as Oracle GraalVM for JDK versions 17.0.15, 21.0.7, and 24.0.1, and Oracle GraalVM Enterprise Edition 21.3.14. No known exploits are currently reported in the wild, but the potential for full system compromise makes this a critical issue for organizations relying on these Java runtimes, especially in client-side environments where untrusted code execution is possible.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for enterprises and government agencies that utilize Java Web Start applications or sandboxed Java applets in client environments. The ability for an unauthenticated attacker to remotely compromise systems could lead to data breaches, unauthorized access to sensitive information, disruption of business operations, and potential lateral movement within networks. Organizations in sectors such as finance, healthcare, telecommunications, and critical infrastructure that rely on Java-based client applications are at heightened risk. The compromise of Java runtimes could also undermine trust in software supply chains and client-side security controls. Additionally, given the widespread use of Oracle Java SE and GraalVM in Europe, the vulnerability could affect a broad range of endpoints, increasing the attack surface. The difficulty in exploitation may reduce immediate risk, but the high impact of a successful attack necessitates urgent attention to patching and mitigation.

Mitigation Recommendations

1. Immediate application of Oracle's security patches once they become available is critical. Organizations should monitor Oracle's official channels for patch releases related to CVE-2025-30749. 2. Restrict or disable the use of Java Web Start applications and sandboxed Java applets, especially those that load untrusted code from the internet, unless absolutely necessary. 3. Implement network segmentation and firewall rules to limit network access to systems running vulnerable Java versions, reducing exposure to remote attackers. 4. Employ application whitelisting and endpoint protection solutions to detect and block unauthorized Java code execution. 5. Conduct thorough inventory and auditing of Java runtime deployments to identify and prioritize vulnerable systems for remediation. 6. Educate users about the risks of running untrusted Java applications and enforce policies to prevent execution of unknown or suspicious Java code. 7. Consider migrating client applications away from Java Web Start and applets to more secure technologies where feasible. 8. Utilize runtime application self-protection (RASP) or sandboxing technologies to add additional layers of defense around Java applications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-03-26T05:52:18.812Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b008a83201eaacd043e0

Added to database: 7/15/2025, 7:46:16 PM

Last enriched: 7/22/2025, 8:49:05 PM

Last updated: 8/1/2025, 4:26:26 AM

Views: 54

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats