CVE-2020-14593

7.4 HIGH

📋 TL;DR

This vulnerability in Oracle Java SE's 2D component allows unauthenticated attackers to modify critical data in Java deployments that run untrusted code. It affects Java SE versions 7u261, 8u251, 11.0.7, 14.0.1 and Java SE Embedded 8u251. The vulnerability primarily impacts client-side Java deployments running sandboxed Java Web Start applications or applets that load untrusted internet code.

💻 Affected Systems

Products:
  • Oracle Java SE
  • Oracle Java SE Embedded
Versions: Java SE: 7u261, 8u251, 11.0.7, 14.0.1; Java SE Embedded: 8u251
Operating Systems: All platforms running affected Java versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments running untrusted code (e.g., sandboxed Java Web Start/applets). Does not affect server deployments running only trusted administrator-installed code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify or delete critical data accessible to Java SE, potentially leading to data corruption, system compromise, or unauthorized data manipulation in affected applications.

🟠

Likely Case

Attackers exploiting malicious Java applets or Web Start applications could modify application data or settings, potentially leading to further exploitation chains.

🟢

If Mitigated

With proper patching and security controls, the risk is eliminated. For server deployments running only trusted code, the vulnerability does not apply.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS indicates easily exploitable with network access via multiple protocols, requiring user interaction (UI:R).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Java SE: 7u271, 8u261, 11.0.8, 14.0.2; Java SE Embedded: 8u261

Vendor Advisory: https://www.oracle.com/security-alerts/cpujul2020.html

Restart Required: Yes

Instructions:

1. Download latest Java version from Oracle website. 2. Uninstall old Java version. 3. Install new Java version. 4. Restart affected systems and applications.

🔧 Temporary Workarounds

Disable Java in browsers

all

Prevent Java applets from running in web browsers

Browser-specific: Disable Java plugin/add-on

Restrict Java Web Start

all

Disable or restrict Java Web Start applications

Windows: Control Panel > Java > Security > Uncheck 'Enable Java content in browser'
Linux: Update deployment.properties to restrict Web Start

🧯 If You Can't Patch

  • Disable Java in all web browsers and restrict Java Web Start usage
  • Implement network segmentation to isolate Java clients and monitor for suspicious Java network activity

🔍 How to Verify

Check if Vulnerable:

Run 'java -version' and check if version matches affected versions: 1.7.0_261, 1.8.0_251, 11.0.7, 14.0.1, or Java SE Embedded 8u251

Check Version:

java -version

Verify Fix Applied:

Run 'java -version' and verify version is patched: 1.7.0_271+, 1.8.0_261+, 11.0.8+, 14.0.2+, or Java SE Embedded 8u261+

📡 Detection & Monitoring

Log Indicators:

  • Java crash logs with 2D component errors
  • Security manager violation logs related to graphics operations

Network Indicators:

  • Unexpected Java network connections from client systems
  • Java Web Start/JNLP file downloads from untrusted sources

SIEM Query:

source="java.log" AND ("2D" OR "Graphics2D") AND (error OR exception OR violation)

🔗 References

📤 Share & Export