Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-30754: Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. in Oracle Corporation Oracle Java SE

0
Medium
VulnerabilityCVE-2025-30754cvecve-2025-30754
Published: Tue Jul 15 2025 (07/15/2025, 19:27:30 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Java SE

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 11/04/2025, 02:34:10 UTC

Technical Analysis

CVE-2025-30754 is a vulnerability in the JSSE (Java Secure Socket Extension) component of Oracle Java SE and Oracle GraalVM for JDK and Enterprise Edition. It affects multiple supported versions including Oracle Java SE 8u451, 11.0.27, 17.0.15, 21.0.7, and 24.0.1, as well as corresponding GraalVM versions. The flaw allows an unauthenticated attacker with network access over TLS to compromise the confidentiality and integrity of some accessible data within these Java environments. Specifically, successful exploitation can lead to unauthorized read access and unauthorized update, insert, or delete operations on certain data accessible by the vulnerable Java runtime. The vulnerability is difficult to exploit, requiring high attack complexity, and does not require user interaction or privileges. It primarily affects client-side Java deployments that run untrusted code, such as sandboxed Java Web Start applications or applets loaded from the internet, which rely on the Java sandbox for security enforcement. Server-side Java deployments that load only trusted code installed by administrators are not vulnerable. The CVSS 3.1 vector (AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N) indicates network attack vector, high complexity, no privileges or user interaction, unchanged scope, and low confidentiality and integrity impacts without availability impact. No patches were linked in the provided data, and no known exploits are reported in the wild, suggesting this is a recently disclosed vulnerability. The CWE-284 classification indicates an authorization bypass or insufficient access control issue. This vulnerability highlights risks in sandboxed Java environments that execute untrusted code and rely on the Java sandbox for security, emphasizing the need for careful management of such deployments.

Potential Impact

For European organizations, the impact of CVE-2025-30754 depends largely on their use of affected Oracle Java SE and GraalVM versions in client-side or sandboxed environments. Organizations that deploy Java Web Start applications or Java applets that load untrusted code from the internet are at risk of unauthorized data access and modification within the Java runtime environment. This could lead to data integrity issues or leakage of sensitive information accessible to the Java process. However, server-side Java deployments running only trusted code are not affected, limiting the scope for many enterprise backend systems. The medium severity rating and difficult exploitation reduce the immediate risk, but organizations with legacy or client-side Java applications should be cautious. The vulnerability could be leveraged in targeted attacks against users running vulnerable Java clients, potentially as part of a broader attack chain. Given the widespread use of Oracle Java in Europe across industries such as finance, manufacturing, and government, any exploitation could disrupt business operations or lead to data breaches. The lack of known exploits currently reduces urgency but does not eliminate risk, especially as attackers may develop exploits over time.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Identify and inventory all Oracle Java SE and GraalVM deployments, focusing on client-side and sandboxed environments that run untrusted code. 2) Apply vendor patches or updates as soon as they become available for the affected Java versions to remediate the vulnerability. 3) Restrict network access to Java client applications that use TLS, limiting exposure to untrusted networks and reducing attack surface. 4) Where possible, disable or remove Java Web Start and Java applet support in browsers and client environments to eliminate the vulnerable attack vector. 5) Employ application whitelisting and sandboxing techniques to control execution of untrusted Java code. 6) Monitor network traffic for unusual TLS connections to Java clients that could indicate exploitation attempts. 7) Educate users about the risks of running untrusted Java applications and enforce policies to prevent execution of unknown code. 8) For server-side environments, ensure only trusted code is deployed and maintain strict access controls to prevent unauthorized code execution. These targeted actions go beyond generic advice by focusing on the specific deployment scenarios and attack vectors relevant to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-03-26T05:52:18.813Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b009a83201eaacd043f9

Added to database: 7/15/2025, 7:46:17 PM

Last enriched: 11/4/2025, 2:34:10 AM

Last updated: 11/19/2025, 6:35:59 AM

Views: 282

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats