CVE-2022-21449

HIGH LAB

Oracle Java SE <18 - Unauth RCE

Title source: llm
STIX 2.1

Description

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.2 and 18; Oracle GraalVM Enterprise Edition: 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

Exploits (13)

nomisec WORKING POC 123 stars
by notkmhn · poc
https://github.com/notkmhn/CVE-2022-21449-TLS-PoC
nomisec SCANNER 37 stars
by jfrog · poc
https://github.com/jfrog/jfrog-CVE-2022-21449
nomisec WRITEUP 5 stars
by thack1 · poc
https://github.com/thack1/CVE-2022-21449
nomisec WORKING POC 2 stars
by jmiettinen · poc
https://github.com/jmiettinen/CVE-2022-21449-vuln-test
nomisec WORKING POC 1 stars
by fevra-dev · poc
https://github.com/fevra-dev/ClaimJumper
nomisec WRITEUP 1 stars
by HeyMrSalt · poc
https://github.com/HeyMrSalt/AIS3-2024-Project-D5Team
nomisec WORKING POC
by volodymyr-hladkyi-symphony · poc
https://github.com/volodymyr-hladkyi-symphony/demo-cve-2022-21449
nomisec WORKING POC
by AlexanderZinoni · poc
https://github.com/AlexanderZinoni/CVE-2022-21449
nomisec WORKING POC
by davwwwx · poc
https://github.com/davwwwx/CVE-2022-21449
nomisec WORKING POC
by Skipper7718 · poc
https://github.com/Skipper7718/CVE-2022-21449-showcase
nomisec NO CODE
by fundaergn · poc
https://github.com/fundaergn/CVE-2022-21449
nomisec WORKING POC
by Damok82 · poc
https://github.com/Damok82/SignChecker
nomisec WORKING POC
by marschall · poc
https://github.com/marschall/psychic-signatures

References (18)

Scores

CVSS v3 7.5
EPSS 0.3433
EPSS Percentile 97.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

Status published
Products (21)
azul/zulu 15.38
azul/zulu 17.32
azul/zulu 18.28
debian/debian_linux 10.0
debian/debian_linux 11.0
netapp/7-mode_transition_tool
netapp/active_iq_unified_manager (2 CPE variants)
netapp/cloud_insights
netapp/e-series_santricity_os_controller 11.0
netapp/e-series_santricity_storage_manager
... and 11 more
Published Apr 19, 2022
Tracked Since Feb 18, 2026