CVE-2026-34282: Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. in Oracle Corporation Oracle Java SE
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
AI Analysis
Technical Summary
This vulnerability affects Oracle Java SE and Oracle GraalVM products in their networking components across multiple versions. It permits unauthenticated remote attackers to cause a denial of service by triggering hangs or repeated crashes. The attack vector is network-based with low complexity and no privileges or user interaction required. Exploitation can occur via APIs, including those exposed by web services or sandboxed Java applications that execute untrusted code. The impact is limited to availability, with no confidentiality or integrity loss. Oracle's April 2026 Critical Patch Update advisory references this vulnerability but does not explicitly state patch availability or remediation details for it. Customers are strongly advised to monitor Oracle advisories for patch releases and apply updates promptly once available.
Potential Impact
Successful exploitation results in a denial of service condition causing the affected Oracle Java SE or GraalVM instances to hang or crash repeatedly, impacting availability. There is no impact on confidentiality or integrity. The vulnerability can be exploited remotely without authentication, increasing its risk in exposed network environments. No known exploits in the wild have been reported so far.
Mitigation Recommendations
Oracle's April 2026 Critical Patch Update advisory includes this vulnerability among many others but does not explicitly confirm patch availability or provide a specific fix for CVE-2026-34282 at this time. Customers should regularly check Oracle's official security alerts and apply Critical Patch Updates promptly when patches for this vulnerability are released. Until a patch is available, consider restricting network access to vulnerable Oracle Java SE and GraalVM services where feasible to reduce exposure. No vendor advisory states that no action is required or that the issue is already mitigated.
CVE-2026-34282: Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. in Oracle Corporation Oracle Java SE
Description
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability affects Oracle Java SE and Oracle GraalVM products in their networking components across multiple versions. It permits unauthenticated remote attackers to cause a denial of service by triggering hangs or repeated crashes. The attack vector is network-based with low complexity and no privileges or user interaction required. Exploitation can occur via APIs, including those exposed by web services or sandboxed Java applications that execute untrusted code. The impact is limited to availability, with no confidentiality or integrity loss. Oracle's April 2026 Critical Patch Update advisory references this vulnerability but does not explicitly state patch availability or remediation details for it. Customers are strongly advised to monitor Oracle advisories for patch releases and apply updates promptly once available.
Potential Impact
Successful exploitation results in a denial of service condition causing the affected Oracle Java SE or GraalVM instances to hang or crash repeatedly, impacting availability. There is no impact on confidentiality or integrity. The vulnerability can be exploited remotely without authentication, increasing its risk in exposed network environments. No known exploits in the wild have been reported so far.
Mitigation Recommendations
Oracle's April 2026 Critical Patch Update advisory includes this vulnerability among many others but does not explicitly confirm patch availability or provide a specific fix for CVE-2026-34282 at this time. Customers should regularly check Oracle's official security alerts and apply Critical Patch Updates promptly when patches for this vulnerability are released. Until a patch is available, consider restricting network access to vulnerable Oracle Java SE and GraalVM services where feasible to reduce exposure. No vendor advisory states that no action is required or that the issue is already mitigated.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- oracle
- Date Reserved
- 2026-03-26T19:48:45.676Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
- Vendor Advisory Urls
- [{"url":"https://www.oracle.com/security-alerts/cpuapr2026.html","vendor":"Oracle"}]
Threat ID: 69e7e5a419fe3cd2cdf9f87f
Added to database: 4/21/2026, 9:01:24 PM
Last enriched: 4/21/2026, 10:01:23 PM
Last updated: 4/22/2026, 6:06:28 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.