Skip to main content

CVE-2025-30754: Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. in Oracle Corporation Oracle Java SE

Medium
VulnerabilityCVE-2025-30754cvecve-2025-30754
Published: Tue Jul 15 2025 (07/15/2025, 19:27:30 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle Java SE

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/23/2025, 01:40:57 UTC

Technical Analysis

CVE-2025-30754 is a medium-severity vulnerability affecting Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition, specifically in the JSSE (Java Secure Socket Extension) component. The vulnerability exists in versions including Oracle Java SE 8u451, 11.0.27, 17.0.15, 21.0.7, and 24.0.1, as well as corresponding versions of Oracle GraalVM. It allows an unauthenticated attacker with network access via TLS to potentially compromise the affected Java runtimes. The exploitation is described as difficult, requiring high attack complexity and no privileges or user interaction, but it can lead to unauthorized read, update, insert, or delete access to some data accessible by these Java runtimes. The vulnerability primarily impacts Java deployments that run untrusted code, such as sandboxed Java Web Start applications or sandboxed Java applets that load code from the internet and rely on the Java sandbox for security. It does not affect server-side Java deployments that only run trusted code installed by administrators. The CVSS 3.1 base score is 4.8, reflecting low confidentiality and integrity impacts without availability impact. The vulnerability is related to improper access control (CWE-284) within the JSSE component, potentially allowing unauthorized data manipulation or disclosure. No known exploits are currently in the wild, and no patches are linked yet, indicating that organizations should monitor for updates. The attack vector is network-based over TLS, but the attack complexity is high, meaning exploitation requires specific conditions or skills. This vulnerability highlights risks in client-side Java applications that handle untrusted code, which remain relevant in some enterprise environments despite the decline of Java applets and Web Start usage.

Potential Impact

For European organizations, the impact of CVE-2025-30754 depends largely on their use of affected Oracle Java SE and GraalVM versions in client-side environments running untrusted code. Organizations that still rely on Java Web Start applications or sandboxed applets for internal or partner-facing tools could face unauthorized data access or modification risks, potentially leading to data integrity issues or leakage of sensitive information. While the vulnerability does not affect server-side Java deployments running trusted code, enterprises with legacy or specialized client applications may be vulnerable. The medium severity and difficult exploitation reduce the immediate risk, but targeted attacks against critical business functions using vulnerable Java clients could disrupt operations or compromise data confidentiality and integrity. European organizations in finance, manufacturing, or government sectors that historically used Java applets for internal tools might be more exposed. Additionally, the network-based attack vector via TLS means that attackers could exploit this vulnerability remotely if network access is available, increasing the attack surface. The lack of known exploits suggests a window for proactive mitigation before active exploitation occurs.

Mitigation Recommendations

1. Inventory and identify all Oracle Java SE and GraalVM installations, focusing on client-side deployments that run untrusted code such as Java Web Start applications or sandboxed applets. 2. Where possible, phase out or replace legacy Java Web Start and applet technologies with modern, supported alternatives that do not rely on the Java sandbox model. 3. Apply the latest Oracle patches as soon as they become available for the affected versions to remediate the vulnerability. 4. Restrict network access to client machines running vulnerable Java versions, especially limiting TLS connections from untrusted networks to reduce exposure. 5. Implement strict network segmentation and monitoring to detect anomalous TLS traffic that could indicate exploitation attempts. 6. Enforce application whitelisting and code signing policies to prevent execution of untrusted or unauthorized Java code. 7. Educate users about the risks of running untrusted Java applications and encourage disabling Java browser plugins and Web Start where not required. 8. Monitor Oracle security advisories and vulnerability databases for updates or exploit disclosures related to CVE-2025-30754.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-03-26T05:52:18.813Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876b009a83201eaacd043f9

Added to database: 7/15/2025, 7:46:17 PM

Last enriched: 7/23/2025, 1:40:57 AM

Last updated: 8/18/2025, 1:15:53 AM

Views: 62

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats