3.7
Advisory Published
Updated

CVE-2022-39399

First published: Tue Oct 18 2022(Updated: )

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

Credit: secalert_us@oracle.com secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Oracle GraalVM=20.3.7
Oracle GraalVM=21.3.3
Oracle GraalVM=22.2.0
Oracle JDK=11.0.16.1
Oracle JDK=17.0.4.1
Oracle JDK=19
Oracle JRE=11.0.16.1
Oracle JRE=17.0.4.1
Oracle JRE=19
Fedoraproject Fedora=35
Fedoraproject Fedora=36
NetApp 7-Mode Transition Tool
Netapp Cloud Insights Acquisition Unit
Netapp Cloud Secure Agent
NetApp E-Series SANtricity OS Controller>=11.0<=11.70.2
Netapp E-series Santricity Storage Manager
Netapp E-series Santricity Unified Manager
NetApp OnCommand Insight
NetApp OnCommand Workflow Automation
Netapp Santricity Storage Plugin Vcenter
NetApp SANtricity Web Services Proxy
Azul Zulu=11.58
Azul Zulu=13.50
Azul Zulu=15.42
Azul Zulu=17.36
Azul Zulu=19.28

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID?

    The vulnerability ID is CVE-2022-39399.

  • What is the affected software?

    The affected software includes Oracle Java SE versions 11.0.16.1, 17.0.4.1, and 19, as well as Oracle GraalVM Enterprise Edition versions 20.3.7, 21.3.3, and 22.2.0.

  • What is the severity level of CVE-2022-39399?

    The severity level of CVE-2022-39399 is low, with a severity value of 3.7.

  • How can I exploit CVE-2022-39399?

    CVE-2022-39399 is a difficult to exploit vulnerability, so it may not be easily exploitable.

  • Where can I find more information about CVE-2022-39399?

    You can find more information about CVE-2022-39399 in the references provided: [Reference 1](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37QDWJBGEPP65X43NXQTXQ7KASLUHON6/), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EXSBV3W6EP6B7XJ63Z2FPVBH6HAPGJ5T/), [Reference 3](https://security.netapp.com/advisory/ntap-20221028-0012/).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203