CVE-2012-4681
CRITICAL KEV RANSOMWAREJava 7 Applet Remote Code Execution
Title source: metasploitDescription
Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotejava
https://www.exploit-db.com/exploits/20865
nomisec
WORKING POC
1 stars
by benjholla · local
https://github.com/benjholla/CVE-2012-4681-Armoring
metasploit
WORKING POC
EXCELLENT
by Adam Gowdiak, s advisory, , # Vulnerability discovery according to Oracle, jduck, sinn3r, juan vazquez · rubypocjava
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/java_jre17_exec.rb
Scores
CVSS v3
9.8
EPSS
0.9414
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2022-03-03
VulnCheck KEV
2012-08-28
InTheWild.io
2017-08-05
ENISA EUVD
EUVD-2012-4606
Ransomware Use
Confirmed
CWE
CWE-284
Status
published
Products (3)
oracle/jdk
1.6.0 (34 CPE variants)
oracle/jdk
1.7.0 (7 CPE variants)
oracle/jre
1.6.0 (9 CPE variants)
Published
Aug 28, 2012
KEV Added
Mar 03, 2022
Tracked Since
Feb 18, 2026