Impact
The flaw resides in the remote method invocation (RMI) component of Oracle Java SE, Oracle GraalVM for JDK, and Oracle GraalVM Enterprise Edition. An unauthenticated attacker that can reach the JVM over the network can execute privileged operations via JMX or RMI, enabling the attacker to read, insert, update, or delete data accessible through these interfaces. The weakness is classified as CWE-322, an authentication bypass that compromises confidentiality and integrity of application data.
Affected Systems
Affected versions include Oracle Java SE 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, and 25.0.1; Oracle GraalVM for JDK 17.0.17 and 21.0.9; and Oracle GraalVM Enterprise Edition 21.3.16. Red Hat OpenJDK Enterprise Linux Service 11 deployments on EL7, EL8, and EL9 may also be vulnerable due to bundled Java runtimes.
Risk and Exploitability
CVSS v3.1 base score of 4.8 reflects moderate severity with low confidentiality and integrity impact and no availability effect. The EPSS score of less than 1% indicates a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw over the network via exposed RMI or JMX interfaces; no authentication or privilege elevation is required. Because the vulnerability is described as difficult to exploit, a non-trivial threat model is implied, but the overall risk remains moderate.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN