First published: Mon Jul 17 2017(Updated: )
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle OpenJDK 1.8.0 | =1.8.0-update131 | |
Oracle JRE | =1.8.0-update131 | |
Debian | =9.0 | |
Red Hat Satellite | =5.8 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.3 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Phoenix Contact FL MGuard DM | <=1.8.0 | |
NetApp Active IQ Unified Manager | >=7.3 | |
NetApp Active IQ Unified Manager for VMware vSphere | >=9.5 | |
NetApp Cloud Backup | ||
NetApp E-Series SANtricity OS Controller | >=11.0<=11.70.1 | |
NetApp SANtricity Storage Manager | ||
NetApp Element OS | ||
NetApp OnCommand Balance | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Performance Manager | ||
NetApp OnCommand Shift | ||
NetApp OnCommand Unified Manager for vSphere | <=7.1 | |
NetApp OnCommand Unified Manager for Windows | <=7.1 | |
NetApp OnCommand Unified Manager for 7-Mode | ||
NetApp Plug-in for Symantec NetBackup | ||
NetApp SnapManager for Oracle | ||
NetApp SnapManager for SAP | ||
NetApp SteelStore Cloud Integrated Storage | ||
NetApp Storage Replication Adapter for Clustered Data ONTAP | >=7.2 | |
NetApp VASA Provider | >=7.2 | |
NetApp VASA Provider | =6.0 | |
NetApp Virtual Storage Console for VMware vSphere | >=7.2 | |
NetApp Virtual Storage Console for VMware vSphere | =6.0 | |
NetApp Virtual Storage Console for VMware vSphere | =6.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10078 has a high severity rating, allowing easy exploitation by low privileged attackers with network access.
To fix CVE-2017-10078, update to the latest version of Java SE that addresses this vulnerability.
CVE-2017-10078 specifically affects Java SE versions 8u131 and earlier.
CVE-2017-10078 can be exploited through various network protocols, enabling unauthorized system access.
Yes, CVE-2017-10078 is considered easily exploitable by attackers with low privileges.