CVE-2025-30698

5.6 MEDIUM

📋 TL;DR

This vulnerability in Oracle Java SE and GraalVM's 2D component allows an unauthenticated attacker with network access to potentially compromise Java deployments. It primarily affects clients running sandboxed Java Web Start applications or applets that load untrusted code from the internet. Server deployments running only trusted code are not affected.

💻 Affected Systems

Products:
  • Oracle Java SE
  • Oracle GraalVM for JDK
  • Oracle GraalVM Enterprise Edition
Versions: Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition: 20.3.17, 21.3.13
Operating Systems: All platforms running affected Java versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments loading untrusted code (e.g., Java Web Start, applets). Server deployments running only trusted code are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Successful exploitation could lead to unauthorized data modification, data exfiltration, and partial denial of service in affected Java deployments.

🟠

Likely Case

Limited data access and manipulation in sandboxed Java applications, potentially leading to information disclosure or application disruption.

🟢

If Mitigated

Minimal impact if deployments only run trusted code or have network restrictions preventing exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Vulnerability is difficult to exploit according to Oracle's assessment. Requires network access and specific conditions to be met.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle's April 2025 Critical Patch Update

Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2025.html

Restart Required: Yes

Instructions:

1. Download and install the latest Java updates from Oracle. 2. For Java SE: Update to versions beyond those listed as affected. 3. For GraalVM: Apply patches from Oracle's security updates. 4. Restart affected applications and systems.

🔧 Temporary Workarounds

Disable Java Web Start and Applets

all

Prevent execution of untrusted Java code in browser environments

Browser-specific: Disable Java plugin in browser settings
System-wide: Remove or disable Java browser plugins

Network Segmentation

all

Restrict network access to Java applications

firewall rules to limit inbound connections to Java services

🧯 If You Can't Patch

  • Disable Java Web Start and browser applets entirely
  • Implement strict network controls to limit access to Java applications

🔍 How to Verify

Check if Vulnerable:

Check Java version with 'java -version' and compare against affected versions list

Check Version:

java -version

Verify Fix Applied:

Verify Java version is updated beyond affected versions and check patch installation logs

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java process crashes
  • Suspicious network connections to Java applications
  • Security manager violation logs

Network Indicators:

  • Unexpected network traffic to Java application ports
  • Multiple failed connection attempts to Java services

SIEM Query:

source="java.log" AND (event="SecurityException" OR event="AccessControlException")

🔗 References

📤 Share & Export