Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61755: Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM for JDK accessible data. in Oracle Corporation Oracle GraalVM for JDK

0
Low
VulnerabilityCVE-2025-61755cvecve-2025-61755
Published: Tue Oct 21 2025 (10/21/2025, 20:03:10 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: Oracle GraalVM for JDK

Description

Vulnerability in the Oracle GraalVM for JDK product of Oracle Java SE (component: Compiler). Supported versions that are affected are Oracle GraalVM for JDK: 17.0.16 and 21.0.8. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle GraalVM for JDK accessible data. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).

AI-Powered Analysis

AILast updated: 10/28/2025, 21:59:07 UTC

Technical Analysis

CVE-2025-61755 is a vulnerability identified in Oracle GraalVM for JDK, specifically affecting versions 17.0.16 and 21.0.8. The flaw resides in the compiler component of the product and allows an unauthenticated attacker with network access via multiple protocols to compromise the system. The exploitation is considered difficult due to the high attack complexity, and no user interaction or privileges are required. Successful exploitation results in unauthorized read access to a subset of data accessible through Oracle GraalVM for JDK, impacting confidentiality but not integrity or availability. The CVSS 3.1 base score is 3.7, reflecting a low severity primarily due to limited confidentiality impact and the difficulty of exploitation. The vulnerability does not allow code execution or denial of service, and no known exploits have been reported in the wild as of the publication date. The CWE classification is CWE-862, indicating improper authorization. No patches were linked at the time of disclosure, suggesting that Oracle may be preparing updates or that mitigations are currently limited to access controls and network restrictions.

Potential Impact

For European organizations, the primary impact of CVE-2025-61755 is the potential unauthorized disclosure of sensitive data accessible via Oracle GraalVM for JDK. While the scope of data exposure is limited and does not include modification or disruption, any leakage of confidential information can have regulatory and reputational consequences, especially under GDPR. Organizations running affected versions in network-exposed environments risk attackers gaining read access to internal data subsets. This could be leveraged for further reconnaissance or combined with other vulnerabilities for more severe attacks. The difficulty of exploitation reduces immediate risk, but the presence of this vulnerability in critical Java runtime environments used in enterprise applications means that high-value targets such as financial institutions, government agencies, and technology firms could be affected. The lack of known exploits lowers urgency but does not eliminate the need for vigilance.

Mitigation Recommendations

European organizations should proactively monitor Oracle's security advisories for patches addressing CVE-2025-61755 and plan timely upgrades to fixed versions once available. Until patches are released, network segmentation and strict access controls should be enforced to limit exposure of Oracle GraalVM services to untrusted networks. Employing firewall rules to restrict inbound traffic to trusted hosts and protocols can reduce attack surface. Additionally, organizations should audit their use of GraalVM for JDK to identify and isolate instances running affected versions. Implementing network intrusion detection systems tuned to detect anomalous access patterns to GraalVM services may provide early warning. Finally, integrating this vulnerability into vulnerability management and risk assessment workflows ensures ongoing awareness and prioritization.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2025-09-30T19:21:55.556Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7e96f01721c03c6f13e6b

Added to database: 10/21/2025, 8:13:35 PM

Last enriched: 10/28/2025, 9:59:07 PM

Last updated: 10/29/2025, 1:10:44 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats