CVE-2022-21624
OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Una vulnerabilidad en el producto Oracle Java SE, Oracle GraalVM Enterprise Edition de Oracle Java SE (componente: JNDI). Las versiones soportadas que están afectadas son Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 y 22.2.0. Una vulnerabilidad difícil de explotar permite a un atacante no autenticado con acceso a la red por medio de múltiples protocolos comprometer a Oracle Java SE, Oracle GraalVM Enterprise Edition. Los ataques con éxito de esta vulnerabilidad pueden resultar en una actualización no autorizada, insertar o eliminar el acceso a algunos de los datos accesibles de Oracle Java SE, Oracle GraalVM Enterprise Edition. Nota: Esta vulnerabilidad es aplicada a las implantaciones de Java, normalmente en clientes que ejecutan aplicaciones Java Web Start con sandbox o applets Java con sandbox, que cargan y ejecutan código que no es confiable (por ejemplo, código que viene de Internet) y dependen del sandbox de Java para la seguridad. Esta vulnerabilidad también puede ser explotada mediante el uso de APIs en el Componente especificado, por ejemplo, mediante un servicio web que suministra datos a las APIs. CVSS 3.1 Puntuación Base 3.7 (Impactos en la Integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-11-15 CVE Reserved
- 2022-10-18 CVE Published
- 2024-03-30 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-330: Use of Insufficiently Random Values
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
https://security.gentoo.org/glsa/202401-25 | ||
https://security.netapp.com/advisory/ntap-20221028-0012 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.oracle.com/security-alerts/cpuoct2022.html | 2024-01-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 20.3.7 Search vendor "Oracle" for product "Graalvm" and version "20.3.7" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 21.3.3 Search vendor "Oracle" for product "Graalvm" and version "21.3.3" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Graalvm Search vendor "Oracle" for product "Graalvm" | 22.2.0 Search vendor "Oracle" for product "Graalvm" and version "22.2.0" | enterprise |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 1.8.0 Search vendor "Oracle" for product "Jdk" and version "1.8.0" | update341 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 1.8.0 Search vendor "Oracle" for product "Jdk" and version "1.8.0" | update345, enterprise_performance_pack |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 11.0.16.1 Search vendor "Oracle" for product "Jdk" and version "11.0.16.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 17.0.4.1 Search vendor "Oracle" for product "Jdk" and version "17.0.4.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jdk Search vendor "Oracle" for product "Jdk" | 19 Search vendor "Oracle" for product "Jdk" and version "19" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 1.8.0 Search vendor "Oracle" for product "Jre" and version "1.8.0" | update341 |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 1.8.0 Search vendor "Oracle" for product "Jre" and version "1.8.0" | update345, enterprise_performance_pack |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 11.0.16.1 Search vendor "Oracle" for product "Jre" and version "11.0.16.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 17.0.4.1 Search vendor "Oracle" for product "Jre" and version "17.0.4.1" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jre Search vendor "Oracle" for product "Jre" | 19 Search vendor "Oracle" for product "Jre" and version "19" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 35 Search vendor "Fedoraproject" for product "Fedora" and version "35" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 36 Search vendor "Fedoraproject" for product "Fedora" and version "36" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | 7-mode Transition Tool Search vendor "Netapp" for product "7-mode Transition Tool" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Cloud Insights Acquisition Unit Search vendor "Netapp" for product "Cloud Insights Acquisition Unit" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Cloud Secure Agent Search vendor "Netapp" for product "Cloud Secure Agent" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | E-series Santricity Os Controller Search vendor "Netapp" for product "E-series Santricity Os Controller" | >= 11.0 <= 11.70.2 Search vendor "Netapp" for product "E-series Santricity Os Controller" and version " >= 11.0 <= 11.70.2" | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | E-series Santricity Storage Manager Search vendor "Netapp" for product "E-series Santricity Storage Manager" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | E-series Santricity Unified Manager Search vendor "Netapp" for product "E-series Santricity Unified Manager" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Oncommand Insight Search vendor "Netapp" for product "Oncommand Insight" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Oncommand Workflow Automation Search vendor "Netapp" for product "Oncommand Workflow Automation" | - | - |
Affected
| ||||||
Netapp Search vendor "Netapp" | Santricity Storage Plugin Search vendor "Netapp" for product "Santricity Storage Plugin" | - | vcenter |
Affected
| ||||||
Netapp Search vendor "Netapp" | Santricity Web Services Proxy Search vendor "Netapp" for product "Santricity Web Services Proxy" | - | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 6.49 Search vendor "Azul" for product "Zulu" and version "6.49" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 7.56 Search vendor "Azul" for product "Zulu" and version "7.56" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 8.64 Search vendor "Azul" for product "Zulu" and version "8.64" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 11.58 Search vendor "Azul" for product "Zulu" and version "11.58" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 13.50 Search vendor "Azul" for product "Zulu" and version "13.50" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 15.42 Search vendor "Azul" for product "Zulu" and version "15.42" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 17.36 Search vendor "Azul" for product "Zulu" and version "17.36" | - |
Affected
| ||||||
Azul Search vendor "Azul" | Zulu Search vendor "Azul" for product "Zulu" | 19.28 Search vendor "Azul" for product "Zulu" and version "19.28" | - |
Affected
|