Impact
The vulnerability arises when Oracle Java SE, Oracle GraalVM for JDK and Oracle GraalVM Enterprise Edition validate certificates in a sandboxed environment. It allows an unauthenticated attacker with network access to cause a forced hang or complete crash when the Java runtime loads untrusted code. The flaw does not lead to data compromise or privilege escalation; it solely impacts availability.
Affected Systems
Affected versions are Oracle Java SE 8u471, 8u471-b50, 8u471-perf, 11.0.29, 17.0.17, 21.0.9, 25.0.1; Oracle GraalVM for JDK 17.0.17 and 21.0.9; and Oracle GraalVM Enterprise Edition 21.3.16. The list of CPEs also references Red Hat OpenJDK ELS 11, suggesting that equivalent OpenJDK distributions that share the same code base may be impacted.
Risk and Exploitability
The CVSS v3.1 score of 7.5 reflects a high availability impact with low attack complexity. Network based, unauthenticated exploitation is sufficient, and the EPSS score of less than 1 % indicates that, while the probability of exploitation is low, it remains possible. The vulnerability is not flagged in the CISA KEV catalog. Attackers can trigger the flaw over multiple protocols, exposing client‑side Java deployments that rely on the sandbox to potential downtime without needing privileged access or authentication.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN