// For flags

CVE-2021-28167

 

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

In Eclipse Openj9 to version 0.25.0, usage of the jdk.internal.reflect.ConstantPool API causes the JVM in some cases to pre-resolve certain constant pool entries. This allows a user to call static methods or access static members without running the class initialization method, and may allow a user to observe uninitialized values.

En Eclipse Openj9 a versión 0.25.0, el uso de la API jdk.internal.reflect.ConstantPool causa a la JVM en algunos casos resolver previamente determinadas entradas de grupo constante. Esto permite a un usuario llamar a métodos estáticos o acceder a miembros estáticos sin ejecutar el método de inicialización de la clase, y puede permitir a un usuario observar valores no inicializados

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2021-03-12 CVE Reserved
  • 2021-04-21 CVE Published
  • 2024-06-22 EPSS Updated
  • 2024-08-03 CVE Updated
  • 2024-08-03 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-909: Missing Initialization of Resource
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Eclipse
Search vendor "Eclipse"
Openj9
Search vendor "Eclipse" for product "Openj9"
<= 0.25.0
Search vendor "Eclipse" for product "Openj9" and version " <= 0.25.0"
-
Affected