5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
6.3 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
37.3%
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM
Enterprise Edition product of Oracle Java SE (component: Hotspot).
Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf,
11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle
GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to
exploit vulnerability allows unauthenticated attacker with network access
via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for
JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this
vulnerability can result in unauthorized access to critical data or
complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle
GraalVM Enterprise Edition accessible data. Note: This vulnerability can be
exploited by using APIs in the specified Component, e.g., through a web
service which supplies data to the APIs. This vulnerability also applies to
Java deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted code
(e.g., code that comes from the internet) and rely on the Java sandbox for
security. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | openjdk-17 | < 17.0.10+7-1~18.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-17 | < 17.0.10+7-1~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | openjdk-17 | < 17.0.10+7-1~22.04.1 | UNKNOWN |
ubuntu | 23.10 | noarch | openjdk-17 | < 17.0.10+7-1~23.10.1 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-21 | < 21.0.2+13-1~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | openjdk-21 | < 21.0.2+13-1~22.04.1 | UNKNOWN |
ubuntu | 23.10 | noarch | openjdk-21 | < 21.0.2+13-1~23.10.1 | UNKNOWN |
ubuntu | 23.10 | noarch | openjdk-22 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | openjdk-8 | < 8u402-ga-2ubuntu1~18.04 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-8 | < 8u402-ga-2ubuntu1~20.04 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2024-20921
nvd.nist.gov/vuln/detail/CVE-2024-20921
security-tracker.debian.org/tracker/CVE-2024-20921
ubuntu.com/security/notices/USN-6660-1
ubuntu.com/security/notices/USN-6661-1
ubuntu.com/security/notices/USN-6662-1
ubuntu.com/security/notices/USN-6696-1
www.cve.org/CVERecord?id=CVE-2024-20921
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
6.3 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
37.3%