CVE-2024-21211
Amazon Corretto JDK vulnerability analysis and mitigation

Overview

CVE-2024-21211 is a vulnerability affecting Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition (component: Compiler). The affected versions include Oracle Java SE: 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and 21.3.11. The vulnerability was disclosed in October 2024 (Oracle CPU).

Technical details

This is a difficult to exploit vulnerability that allows unauthenticated attackers with network access via multiple protocols to compromise the affected components. The vulnerability has a CVSS 3.1 Base Score of 3.7 (LOW) with the vector string: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N. The vulnerability can be exploited through APIs in the specified Component, such as through a web service which supplies data to the APIs (Oracle CPU).

Impact

Successful exploitation of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition accessible data. The vulnerability also applies to Java deployments that typically run in clients with sandboxed Java Web Start applications or sandboxed Java applets, which load and run untrusted code and rely on the Java sandbox for security (Oracle CPU).

Mitigation and workarounds

Oracle has released patches to address this vulnerability in the October 2024 Critical Patch Update. Users should update to the following fixed versions: Oracle Java SE: beyond version 23; Oracle GraalVM for JDK: beyond versions 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: beyond versions 20.3.15 and 21.3.11 (Oracle CPU, NetApp Advisory).

Additional resources


SourceThis report was generated using AI

Related Amazon Corretto JDK vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-50106HIGH8.1
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-1.8.0-openjdk-javadoc-debug
NoYesJul 15, 2025
CVE-2025-53066HIGH7.5
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-1.7.0-openjdk-demo
NoYesOct 21, 2025
CVE-2025-53057MEDIUM5.9
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-1.7.0-openjdk
NoYesOct 21, 2025
CVE-2025-30761MEDIUM5.9
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-1_8_0-openj9-demo
NoYesJul 15, 2025
CVE-2025-61748LOW3.7
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-25-openjdk-headless-fastdebug
NoYesOct 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management