// For flags

CVE-2020-14621

OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136)

Severity Score

5.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JAXP). Supported versions that are affected are Java SE: 7u261, 8u251, 11.0.7 and 14.0.1; Java SE Embedded: 8u251. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

Vulnerabilidad en el producto Java SE, Java SE Embedded de Oracle Java SE (componente: JAXP). Las versiones compatibles que están afectadas son Java SE: 7u261, 8u251, 11.0.7 y 14.0.1; Java SE Embedded: 8u251. La vulnerabilidad explotable fácilmente permite a un atacante no autenticado con acceso de red por medio de múltiples protocolos comprometer a Java SE, Java SE Embedded. Los ataques con éxito de esta vulnerabilidad pueden resultar en actualizaciones no autorizadas, insertar o eliminar el acceso a algunos de los datos accesibles Java SE, Java SE Embedded. Nota: Esta vulnerabilidad solo puede ser explotada al proporcionar datos a las API en el Componente especificado sin usar aplicaciones Java Web Start No Confiables o applets Java No Confiables, tales como a través de un servicio web. CVSS 3.1 Puntuación Base 5.3 (Impactos de la Integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2020-06-19 CVE Reserved
  • 2020-07-15 CVE Published
  • 2024-09-27 CVE Updated
  • 2024-11-08 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
References (19)
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.7.0
Search vendor "Oracle" for product "Jdk" and version "1.7.0"
update261
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
1.8.0
Search vendor "Oracle" for product "Jdk" and version "1.8.0"
update251
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
11.0.7
Search vendor "Oracle" for product "Jdk" and version "11.0.7"
-
Affected
Oracle
Search vendor "Oracle"
Jdk
Search vendor "Oracle" for product "Jdk"
14.0.1
Search vendor "Oracle" for product "Jdk" and version "14.0.1"
-
Affected
Oracle
Search vendor "Oracle"
Jre
Search vendor "Oracle" for product "Jre"
1.8.0
Search vendor "Oracle" for product "Jre" and version "1.8.0"
update251
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
31
Search vendor "Fedoraproject" for product "Fedora" and version "31"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
32
Search vendor "Fedoraproject" for product "Fedora" and version "32"
-
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.9.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.9.0"
-
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.9.1
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.9.1"
-
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.10.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.10.0"
-
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.10.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.10.0"
update_1
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.10.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.10.0"
update_2
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.10.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.10.0"
update_3
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.10.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.10.0"
update_4
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.10.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.10.0"
update_5
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.10.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.10.0"
update_6
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.10.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.10.0"
update_7
Affected
Mcafee
Search vendor "Mcafee"
Epolicy Orchestrator
Search vendor "Mcafee" for product "Epolicy Orchestrator"
5.10.0
Search vendor "Mcafee" for product "Epolicy Orchestrator" and version "5.10.0"
update_8
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
15.1
Search vendor "Opensuse" for product "Leap" and version "15.1"
-
Affected
Opensuse
Search vendor "Opensuse"
Leap
Search vendor "Opensuse" for product "Leap"
15.2
Search vendor "Opensuse" for product "Leap" and version "15.2"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
20.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "20.04"
lts
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected
Netapp
Search vendor "Netapp"
7-mode Transition Tool
Search vendor "Netapp" for product "7-mode Transition Tool"
--
Affected
Netapp
Search vendor "Netapp"
Active Iq Unified Manager
Search vendor "Netapp" for product "Active Iq Unified Manager"
-vmware_vsphere
Affected
Netapp
Search vendor "Netapp"
Active Iq Unified Manager
Search vendor "Netapp" for product "Active Iq Unified Manager"
-windows
Affected
Netapp
Search vendor "Netapp"
Cloud Backup
Search vendor "Netapp" for product "Cloud Backup"
--
Affected
Netapp
Search vendor "Netapp"
Cloud Secure Agent
Search vendor "Netapp" for product "Cloud Secure Agent"
--
Affected
Netapp
Search vendor "Netapp"
E-series Performance Analyzer
Search vendor "Netapp" for product "E-series Performance Analyzer"
--
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Os Controller
Search vendor "Netapp" for product "E-series Santricity Os Controller"
>= 11.0.0 <= 11.70.2
Search vendor "Netapp" for product "E-series Santricity Os Controller" and version " >= 11.0.0 <= 11.70.2"
-
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Storage Manager
Search vendor "Netapp" for product "E-series Santricity Storage Manager"
--
Affected
Netapp
Search vendor "Netapp"
E-series Santricity Web Services
Search vendor "Netapp" for product "E-series Santricity Web Services"
-web_services_proxy
Affected
Netapp
Search vendor "Netapp"
Oncommand Insight
Search vendor "Netapp" for product "Oncommand Insight"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Unified Manager Core Package
Search vendor "Netapp" for product "Oncommand Unified Manager Core Package"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Workflow Automation
Search vendor "Netapp" for product "Oncommand Workflow Automation"
--
Affected
Netapp
Search vendor "Netapp"
Plug-in For Symantec Netbackup
Search vendor "Netapp" for product "Plug-in For Symantec Netbackup"
--
Affected
Netapp
Search vendor "Netapp"
Santricity Unified Manager
Search vendor "Netapp" for product "Santricity Unified Manager"
--
Affected
Netapp
Search vendor "Netapp"
Snapmanager
Search vendor "Netapp" for product "Snapmanager"
-oracle
Affected
Netapp
Search vendor "Netapp"
Snapmanager
Search vendor "Netapp" for product "Snapmanager"
-sap
Affected
Netapp
Search vendor "Netapp"
Steelstore Cloud Integrated Storage
Search vendor "Netapp" for product "Steelstore Cloud Integrated Storage"
--
Affected