CVE-2025-50059

8.6 HIGH

📋 TL;DR

This vulnerability in Oracle Java SE and GraalVM networking components allows unauthenticated attackers with network access to bypass Java sandbox security and access critical data. It primarily affects client-side deployments running untrusted code via Java Web Start or applets. Server deployments running only trusted administrator-installed code are not vulnerable.

💻 Affected Systems

Products:
  • Oracle Java SE
  • Oracle GraalVM for JDK
  • Oracle GraalVM Enterprise Edition
Versions: Oracle Java SE: 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14
Operating Systems: All platforms running affected Java versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments running untrusted code in sandboxed environments (Java Web Start/applets). Server deployments running only trusted code are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete unauthorized access to all accessible data in vulnerable Java deployments, potentially leading to data exfiltration, credential theft, and further system compromise.

🟠

Likely Case

Attackers exploiting internet-facing Java applications to access sensitive data from vulnerable client systems running sandboxed untrusted code.

🟢

If Mitigated

Limited impact if systems only run trusted server-side code or have network segmentation preventing external access to vulnerable components.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS indicates easily exploitable via network access without authentication. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply latest Critical Patch Update (CPU) from July 2025 or later

Vendor Advisory: https://www.oracle.com/security-alerts/cpujul2025.html

Restart Required: Yes

Instructions:

1. Download latest Java updates from Oracle. 2. Uninstall affected versions. 3. Install patched versions. 4. Restart affected systems and applications.

🔧 Temporary Workarounds

Disable Java Web Start and Applets

all

Prevent execution of untrusted sandboxed code by disabling Java Web Start and browser Java applets

Browser-specific: Disable Java plugin in browser settings
System-wide: Remove or disable Java browser extensions

Network Segmentation

linux

Restrict network access to Java applications to trusted networks only

firewall-cmd --permanent --zone=trusted --add-service=http
firewall-cmd --permanent --zone=trusted --add-service=https

🧯 If You Can't Patch

  • Disable Java Web Start and applets completely
  • Implement strict network access controls to limit exposure

🔍 How to Verify

Check if Vulnerable:

Check Java version with 'java -version' and compare against affected versions list

Check Version:

java -version

Verify Fix Applied:

Verify installed Java version is newer than affected versions and check for July 2025 CPU patches

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections from Java processes
  • Java sandbox violation logs
  • Unexpected Java Web Start/applet execution

Network Indicators:

  • Multiple protocol connections to Java applications from untrusted sources
  • Unusual data exfiltration patterns from Java processes

SIEM Query:

source="java" AND (event="sandbox_violation" OR event="security_exception")

🔗 References

📤 Share & Export