CVE-2025-30752: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK. in Oracle Corporation Oracle Java SE
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK product of Oracle Java SE (component: Compiler). The supported version that is affected is Oracle Java SE: 24.0.1; Oracle GraalVM for JDK: 24.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
AI Analysis
Technical Summary
CVE-2025-30752 is a vulnerability identified in Oracle Java SE and Oracle GraalVM for JDK, specifically affecting version 24.0.1 of these products. The vulnerability resides in the compiler component of these Java platforms. It allows an unauthenticated attacker with network access through multiple protocols to potentially cause a partial denial of service (DoS) condition. The vulnerability is characterized as difficult to exploit, requiring network access but no authentication or user interaction. It primarily impacts Java deployments that run untrusted code, such as sandboxed Java Web Start applications or sandboxed Java applets, which rely on the Java sandbox for security. Importantly, this vulnerability does not affect server-side Java deployments that only run trusted code installed by administrators. The CVSS 3.1 base score is 3.7, indicating a low severity level, with the impact limited to availability (partial DoS). The vulnerability is linked to CWE-400, which relates to uncontrolled resource consumption, suggesting that the attack may exploit resource exhaustion to degrade service availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The attack vector is network-based with high attack complexity, no privileges required, and no user interaction needed, but the scope remains unchanged, and there is no impact on confidentiality or integrity.
Potential Impact
For European organizations, the impact of CVE-2025-30752 is relatively limited due to its low severity and partial denial of service effect. However, organizations that utilize Oracle Java SE or Oracle GraalVM for JDK version 24.0.1 in client-side environments—particularly those that run sandboxed Java Web Start applications or applets loading untrusted code—may experience service disruptions or degraded application availability. This could affect business operations relying on Java-based client applications, especially in sectors where such applications are used for critical workflows or user interactions. Since the vulnerability does not affect server-side deployments running trusted code, backend systems and enterprise servers are less likely to be impacted. The absence of known exploits in the wild further reduces immediate risk. Nonetheless, organizations should be aware that partial DoS conditions can lead to reduced productivity and potential indirect impacts on service delivery and user experience.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify and inventory all deployments of Oracle Java SE and Oracle GraalVM for JDK, focusing on version 24.0.1, particularly in client-side environments running sandboxed applications. 2) Restrict network access to Java client applications from untrusted networks where possible, implementing network segmentation and firewall rules to limit exposure to multiple protocols that could be exploited. 3) Where feasible, disable or limit the use of Java Web Start and applets that load untrusted code, or migrate to alternative technologies that do not rely on sandboxed Java code execution. 4) Monitor application and system logs for unusual resource consumption patterns indicative of attempted exploitation of resource exhaustion vulnerabilities. 5) Stay updated with Oracle’s security advisories for patches or updates addressing this vulnerability and plan timely application of patches once available. 6) Educate users and administrators about the risks of running untrusted Java code and enforce strict policies on code execution within sandboxed environments. These measures go beyond generic advice by focusing on network controls, application inventory, and operational policies tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-30752: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK. in Oracle Corporation Oracle Java SE
Description
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK product of Oracle Java SE (component: Compiler). The supported version that is affected is Oracle Java SE: 24.0.1; Oracle GraalVM for JDK: 24.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
AI-Powered Analysis
Technical Analysis
CVE-2025-30752 is a vulnerability identified in Oracle Java SE and Oracle GraalVM for JDK, specifically affecting version 24.0.1 of these products. The vulnerability resides in the compiler component of these Java platforms. It allows an unauthenticated attacker with network access through multiple protocols to potentially cause a partial denial of service (DoS) condition. The vulnerability is characterized as difficult to exploit, requiring network access but no authentication or user interaction. It primarily impacts Java deployments that run untrusted code, such as sandboxed Java Web Start applications or sandboxed Java applets, which rely on the Java sandbox for security. Importantly, this vulnerability does not affect server-side Java deployments that only run trusted code installed by administrators. The CVSS 3.1 base score is 3.7, indicating a low severity level, with the impact limited to availability (partial DoS). The vulnerability is linked to CWE-400, which relates to uncontrolled resource consumption, suggesting that the attack may exploit resource exhaustion to degrade service availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The attack vector is network-based with high attack complexity, no privileges required, and no user interaction needed, but the scope remains unchanged, and there is no impact on confidentiality or integrity.
Potential Impact
For European organizations, the impact of CVE-2025-30752 is relatively limited due to its low severity and partial denial of service effect. However, organizations that utilize Oracle Java SE or Oracle GraalVM for JDK version 24.0.1 in client-side environments—particularly those that run sandboxed Java Web Start applications or applets loading untrusted code—may experience service disruptions or degraded application availability. This could affect business operations relying on Java-based client applications, especially in sectors where such applications are used for critical workflows or user interactions. Since the vulnerability does not affect server-side deployments running trusted code, backend systems and enterprise servers are less likely to be impacted. The absence of known exploits in the wild further reduces immediate risk. Nonetheless, organizations should be aware that partial DoS conditions can lead to reduced productivity and potential indirect impacts on service delivery and user experience.
Mitigation Recommendations
European organizations should take the following specific mitigation steps: 1) Identify and inventory all deployments of Oracle Java SE and Oracle GraalVM for JDK, focusing on version 24.0.1, particularly in client-side environments running sandboxed applications. 2) Restrict network access to Java client applications from untrusted networks where possible, implementing network segmentation and firewall rules to limit exposure to multiple protocols that could be exploited. 3) Where feasible, disable or limit the use of Java Web Start and applets that load untrusted code, or migrate to alternative technologies that do not rely on sandboxed Java code execution. 4) Monitor application and system logs for unusual resource consumption patterns indicative of attempted exploitation of resource exhaustion vulnerabilities. 5) Stay updated with Oracle’s security advisories for patches or updates addressing this vulnerability and plan timely application of patches once available. 6) Educate users and administrators about the risks of running untrusted Java code and enforce strict policies on code execution within sandboxed environments. These measures go beyond generic advice by focusing on network controls, application inventory, and operational policies tailored to the nature of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- oracle
- Date Reserved
- 2025-03-26T05:52:18.813Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6876b009a83201eaacd043f3
Added to database: 7/15/2025, 7:46:17 PM
Last enriched: 7/23/2025, 1:40:34 AM
Last updated: 8/18/2025, 3:56:05 AM
Views: 33
Related Threats
CVE-2025-8567: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in posimyththemes Nexter Blocks – WordPress Gutenberg Blocks & 1000+ Starter Templates
MediumCVE-2025-41689: CWE-306 Missing Authentication for Critical Function in Wiesemann & Theis Motherbox 3
MediumCVE-2025-41685: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in SMA ennexos.sunnyportal.com
MediumCVE-2025-8723: CWE-94 Improper Control of Generation of Code ('Code Injection') in mecanik Cloudflare Image Resizing – Optimize & Accelerate Your Images
CriticalCVE-2025-8622: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webaware Flexible Map
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.