CVE-2022-21449

7.5 HIGH

📋 TL;DR

This vulnerability in Oracle Java SE and GraalVM Enterprise Edition allows unauthenticated attackers with network access to modify critical data without authorization. It affects Java deployments running sandboxed applications that load untrusted code from the internet. The vulnerability can be exploited through multiple protocols and has a CVSS score of 7.5.

💻 Affected Systems

Products:
  • Oracle Java SE
  • Oracle GraalVM Enterprise Edition
Versions: Oracle Java SE: 17.0.2 and 18; Oracle GraalVM Enterprise Edition: 21.3.1 and 22.0.0.2
Operating Systems: All platforms running affected Java versions
Default Config Vulnerable: ⚠️ Yes
Notes: Primarily affects deployments loading untrusted code via sandboxed Java Web Start applications or applets. Also exploitable through APIs in the Libraries component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Java application integrity allowing unauthorized creation, deletion, or modification of all accessible data in affected Java deployments.

🟠

Likely Case

Data tampering in Java applications that load untrusted code from the internet, particularly affecting sandboxed Java Web Start applications and applets.

🟢

If Mitigated

Limited impact if applications don't load untrusted code or if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Easily exploitable via multiple protocols. Public discussions and technical details available in referenced security lists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Oracle Java SE: 17.0.3, 18.0.1; Oracle GraalVM Enterprise Edition: 21.3.2, 22.0.0.3

Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2022.html

Restart Required: Yes

Instructions:

1. Download latest Java updates from Oracle. 2. Uninstall affected versions. 3. Install patched versions. 4. Restart affected applications/services.

🔧 Temporary Workarounds

Disable Java Web Start and Applets

all

Prevent loading of untrusted code by disabling Java Web Start and applet execution

For browsers: Disable Java plugin
System-wide: Configure Java Control Panel to disable applets

Network Segmentation

all

Restrict network access to Java applications to trusted sources only

firewall-cmd --add-rich-rule='rule family="ipv4" source address="TRUSTED_IP" port protocol="tcp" port="PORT_RANGE" accept'
netsh advfirewall firewall add rule name="JavaRestrict" dir=in action=allow remoteip=TRUSTED_IP localport=PORT protocol=TCP

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Disable Java Web Start and applet functionality in all deployments

🔍 How to Verify

Check if Vulnerable:

Check Java version with 'java -version' and verify if it matches affected versions: 17.0.2, 18, or GraalVM 21.3.1, 22.0.0.2

Check Version:

java -version

Verify Fix Applied:

After patching, run 'java -version' to confirm version is 17.0.3+, 18.0.1+, or GraalVM 21.3.2+, 22.0.0.3+

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Java process restarts
  • Unauthorized file modifications in Java application directories
  • Security manager exceptions related to sandbox violations

Network Indicators:

  • Unusual network traffic to Java applications from untrusted sources
  • Multiple protocol attempts to Java services

SIEM Query:

source="java.log" AND (event_type="security_exception" OR process="javaw.exe" OR process="java.exe") AND (version="17.0.2" OR version="18" OR version="21.3.1" OR version="22.0.0.2")

🔗 References

📤 Share & Export