
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-21624 is a vulnerability affecting Oracle Java SE and Oracle GraalVM Enterprise Edition that was disclosed in October 2022. This vulnerability is related to JNDI (Java Naming and Directory Interface) functionality and is described as a difficult-to-exploit vulnerability that allows unauthenticated attackers with network access via multiple protocols to compromise Oracle Java SE (Oracle CPU Oct 2022).
The vulnerability has been assigned a CVSS v3.1 base score of 3.7 (LOW), with the following vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N. This indicates that while the vulnerability is network-accessible, it requires high attack complexity, needs no privileges, and requires no user interaction. The scope is unchanged, with no impact on confidentiality, low impact on integrity, and no impact on availability (NetApp Advisory).
Successful exploitation of this vulnerability could allow unauthorized update, insert or delete access to a subset of Oracle Java SE accessible data. The vulnerability specifically affects JNDI lookups and has been characterized as having low severity due to its high attack complexity (NetApp Advisory).
Oracle has released patches for this vulnerability in the October 2022 Critical Patch Update. The fix is included in Java versions 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, and 19. Users are strongly recommended to update to these or later versions to address the vulnerability (Oracle CPU Oct 2022).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."