4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
5.9 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
8.8%
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM
Enterprise Edition product of Oracle Java SE (component: Security).
Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf,
11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle
GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to
exploit vulnerability allows low privileged attacker with logon to the
infrastructure where Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM
Enterprise Edition executes to compromise Oracle Java SE, Oracle GraalVM
for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this
vulnerability can result in unauthorized access to critical data or
complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle
GraalVM Enterprise Edition accessible data. Note: This vulnerability can be
exploited by using APIs in the specified Component, e.g., through a web
service which supplies data to the APIs. This vulnerability also applies to
Java deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted code
(e.g., code that comes from the internet) and rely on the Java sandbox for
security. CVSS 3.1 Base Score 4.7 (Confidentiality impacts). CVSS Vector:
(CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | openjdk-17 | < 17.0.10+7-1~18.04.1 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-17 | < 17.0.10+7-1~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | openjdk-17 | < 17.0.10+7-1~22.04.1 | UNKNOWN |
ubuntu | 23.10 | noarch | openjdk-17 | < 17.0.10+7-1~23.10.1 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-21 | < 21.0.2+13-1~20.04.1 | UNKNOWN |
ubuntu | 22.04 | noarch | openjdk-21 | < 21.0.2+13-1~22.04.1 | UNKNOWN |
ubuntu | 23.10 | noarch | openjdk-21 | < 21.0.2+13-1~23.10.1 | UNKNOWN |
ubuntu | 23.10 | noarch | openjdk-22 | < any | UNKNOWN |
ubuntu | 18.04 | noarch | openjdk-8 | < 8u402-ga-2ubuntu1~18.04 | UNKNOWN |
ubuntu | 20.04 | noarch | openjdk-8 | < 8u402-ga-2ubuntu1~20.04 | UNKNOWN |
launchpad.net/bugs/cve/CVE-2024-20945
nvd.nist.gov/vuln/detail/CVE-2024-20945
security-tracker.debian.org/tracker/CVE-2024-20945
ubuntu.com/security/notices/USN-6660-1
ubuntu.com/security/notices/USN-6661-1
ubuntu.com/security/notices/USN-6662-1
ubuntu.com/security/notices/USN-6696-1
www.cve.org/CVERecord?id=CVE-2024-20945
4.7 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
5.9 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
8.8%