First published: Wed Jul 15 2020(Updated: )
Vulnerability in the Oracle GraalVM Enterprise Edition product of Oracle GraalVM (component: JVMCI). Supported versions that are affected are 19.3.2 and 20.1.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle GraalVM Enterprise Edition. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle GraalVM Enterprise Edition | =19.3.2 | |
Oracle GraalVM Enterprise Edition | =20.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14718 is considered an easily exploitable vulnerability that allows a high privileged attacker to compromise Oracle GraalVM.
To fix CVE-2020-14718, it is recommended to upgrade Oracle GraalVM to a patched version beyond 20.1.0 and 19.3.2.
CVE-2020-14718 affects users of Oracle GraalVM Enterprise Edition versions 19.3.2 and 20.1.0.
The component affected in CVE-2020-14718 is the JVMCI (Java Virtual Machine Compiler Interface) of Oracle GraalVM.
Yes, CVE-2020-14718 requires network access via multiple protocols to be exploited.